Cutaneous leishmaniasis (CL) is an endemic parasitic disease found in many provinces of Iraq. The immune system plays a crucial role in the development or healing of lesions through chemotactic cytokine activity. This study was aimed to detect the levels of two chemokine ligands (CCL2 and CCL5) in Iraqi patients suffering from dermal ulcers, caused by cutaneous leishmaniasis. It was measured in pre and post-treatment state of Pentostam (Pentavalent Antimony 100 mg). Blood serum concentrations of CCL2, CCL5 were measured by enzyme-linked immunosorbent assay among newly infected patients, two-trial treatment patients and three-trial treatment patients, in comparison with the control group. The result indicated a significant difference in CCL5 level for the three groups of CL patients. Whereas the control (p˂0.5), CCL2 level counterparts showed a significant difference only in newly infected and the thee-trial treatment groups. Moreover, there was a significant difference between all CCL5 patient groups, while no observed difference was detected within patient groups of CCL2.Thus altering the chemokine levels before and after treatment gives insights for parasite role in chemokine expression which may help in new therapeutic approaches for dry or wet CL.
This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreQuinolones L1 (ciprofloxacin) are manufactured wide range anti-infection agents with great oral ingestion and magnificent bioavailability. Because of the concoction capacities found on their core (a carboxylic corrosive capacity at the 3-position) and much of the time an essential piperazinyl ring (or anothertN-heterocycle) at the 7-positionh and a carbonylvoxygenc atomi atothel 4-positioni) quinolones bind metal particlesiframing buildings which can go about as bidentate. Bidentateiligands L2=2-phenyl-2-(P-methoxy anilinee) acetonitrilel was set up by the response of Primiryiaminejwithjbenzaldehyde, in nearness of potassiumbcyanidej and acidicimedia . Theimetalledifices were portrayed by the miniaturized scale component examination (C.H
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.
Skin detection is classification the pixels of the image into two types of pixels skin and non-skin. Whereas, skin color affected by many issues like various races of people, various ages of people gender type. Some previous researchers attempted to solve these issues by applying a threshold that depends on certain ranges of skin colors. Despite, it is fast and simple implementation, it does not give a high detection for distinguishing all colors of the skin of people. In this paper suggests improved ID3 (Iterative Dichotomiser) to enhance the performance of skin detection. Three color spaces have been used a dataset of RGB obtained from machine learning repository, the University of California Irvine (UCI), RGB color space, HSV color sp
... Show MoreThis study was carried out to determine the effects of some environmental variables on biodiversity index value of benthic invertebrates' community in samples that collected monthly from two adjacent sites nearby the confluence of Tigris and Diyala rivers within Baghdad city that’s from November 2007 - October 2008. Results showed differences in chemical and physical characteristics for each river. Where the annual averages of these characteristics in Rivers Tigris and Diyala respectively for: water temperature (20, 19) Cº, pH (8, 8), Dissolved oxygen DO(8,4 ) mg/l , EC(1152,2979)µc/cm , Turbidity (28,74) NTU, Total Hardness of CaCO3 (485,823)mg/l, and finally NO3 (4,6)mg/l. Concerning the biological groups, included types of Insect
... Show More