In order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the control, (135 ± 98), (201 ± 102) and (130 ± 90) respectively, while IL-6 level was not significant either between the groups nor within the group. Furthermore, there was a positive correlation between the optical density readings of (NT) group for CMV-IgG and renin enzyme level with the systolic and diastolic blood pressure with r-value ranged (0.4-0.6). This study may high light on the role of previous infection or re-infection by CMV and increase in blood pressure.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image co
... Show MoreThis article deals with estimations of system Reliability for one component, two and s-out-of-k stress-strength system models with non-identical component strengths which are subjected to a common stress, using Exponentiated Exponential distribution with common scale parameter. Based on simulation, comparison studies are made between the ML, PC and LS estimators of these system reliabilities when scale parameter is known.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
The fall angle of sun rays on the surface of a photovoltaic PV panel and its temperature is negatively affecting the panel electrical energy produced and efficiency. The fall angle problem was commonly solved by using a dual-axis solar tracker that continually maintains the panel orthogonally positioning to the sun rays all day long. This leads to maximum absorption for solar radiation necessary to produce maximum amount of energy and maintain high level of electrical efficiency. To solve the PV panel temperature problem, a Water-Flow Double Glazing WFDG technique has been introduced as a new cooling tool to reduce the panel temperature. In this paper, an integration design of the water glazing system with a dual-axis tracker has been ac
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreSecure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli
... Show MoreIn this paper generalized spline method is used for solving linear system of fractional integro-differential equation approximately. The suggested method reduces the system to system of linear algebraic equations. Different orders of fractional derivative for test example is given in this paper to show the accuracy and applicability of the presented method.
In this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThe spatial assessment criteria system for hybridizing renewable energy sources, such as hybrid solar-wind farms, is critical in selecting ideal installation sites that maximize benefits, reduce costs, protect the environment, and serve the community. However, a systematic approach to designing indicator systems is rarely used in relevant site selection studies. Therefore, the current paper attempts to present an inclusive framework based on content validity to create an effective criteria system for siting wind-solar plants. To this end, the criteria considered in the related literature are captured, and the top 10 frequent indicators are identified. The Delphi technique is used to subject commonly used factors to expert judgme
... Show More