Preferred Language
Articles
/
ijs-450
Investigation of the presence of some virulence factors of the Streptococcus pneumoniae isolates among patients in Basra Governora
...Show More Authors

Extensive studies have been conducted on the microbial properties of Streptococcus pneumoniae  all over the world ,but there are few studies in Iraq on the most important factors of virulence possessed by S.pneumoniae isolates found in Iraq , 195 of sputum specimens were collected from patients with pneumonia acquired from the community who were clinically diagnosed by specialized doctors depending on symptoms and  Radiography of Chest . Eighteen isolates of  S.pneumoniae were  diagnosed  by  special traditional methods that used in the phenotypic identification . All isolates 18 (100%) have been  given  positive results for  the optochin test , bile solubility test ,latex agglutination . Genetically , the study of virulence factors was limited to only 11 (61.11%) isolates by using the Polymerase Chain Reaction(PCR) technique, four genes were investigated responsible for virulence factors deemed necessary for S.pneumoniae to colonize and invade the host. The results showed that the  isolates of S.pneumoniae in Basra  city were fierce ,where  the results of PCR amplification showed  that  the  genes CpsA,  LytA and  Ply  were found in all isolates 11 (61.11%) while the Psa gene was present in  only 9 (50%) isolates within the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Enzyme Linked Immunosorbent Assay for Fumonisin B1 Detection in Local Corn Seeds from Baghdad-Iraq
...Show More Authors

Fungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Telecommunication Systems
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Focal glial detection coincides with precedes amyloid plague formation in APPPS1 transgenic mice by PCR
...Show More Authors

The identification and sequencing of Amyloid Precursor Protien (APP) and presenilin (PS) opened the door for the engineering of transgenic mouse models to study pathogenic mechanisms of Alzheimer Disease (AD). The first successful mouse models over-expressed human APP with an Familiar AD (FAD) linked mutation in the brain. These mice exhibit Aß plaques, neuron loss, dystrophic neurites, inflammatory responses, learning impairments and deficits in synaptic transmission and/or long-term potentiation. The genotypes of all offspring of APP/PS1 mutant mice are analysed by Polymerise Chain Reactions. Generally there are two possibilities to analyse the DNA. The First, primers for APP or PS1 was used separately assuming that both genes are int

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Qur'anic rhetorical nuances in Persian literature: تاثيردقایق و لطایف بلاغی قرآن كريم در ادب فارسی
...Show More Authors

Abstract: Persian literature, after the spread of Islam in Pars, received a lot of influence from the subtle and rhetorical details of the Holy Quran. This effect is more in poetry than in prose because the weights of Persian poetry are closer to the melody of the Qur'an and its weights.The effectiveness of most of the prose works is only in the Quranic themes and words. Persian poetry that has benefited from various sciences of rhetoric, including semantics, eloquence and rhetoric. The degree and manner of influence of each of the didactic, lyrical, epic and travelogue literary types is different from the rhetorical points of the Quran. The instructions under educational literature have benefited the least from Quranic rhetoric. The max

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 24 2014
Journal Name
Wireless Personal Communications
Multi-layer Genetic Algorithm for Maximum Disjoint Reliable Set Covers Problem in Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (22)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Dec 05 2019
Journal Name
Advances In Intelligent Systems And Computing
An Enhanced Evolutionary Algorithm for Detecting Complexes in Protein Interaction Networks with Heuristic Biological Operator
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref