Preferred Language
Articles
/
ijs-7272
Using PCR for detection of cutaneous leishmaniasis in Baghdad
...Show More Authors

Cutaneous Leishmaniasis (CL) is an endemic disease and one of the major health problems in Iraq. Leishmania tropica is known as the causative agent of Cutaneous Leishmaniasis in Baghdad.The classical serological methods of diagnosing leishmaniasis is a poor sensitivity especially for the sub genus and time consuming Here we have investigated two primer pairs, one specific for Leishmania as genus and the primer specific for the species of L. tropica to be detected by polymerase chain reaction (PCR).Samples were collected from (AL-karama Teaching Hospital) and whole genomic DNA was extracted from axenic promastigotes.The extracted DNA was amplified by PCRwith two KDNA primer pairs, for genus specific (13A/13B) and (Lmj4/Uni21) to identify the specific species of cutaneous leishmaniasis. Amplified PCR products then run on gel electrophoresis and two visible bands of the two primers were seen, 120 and 800 bp, respectively. Our results indicate that the PCR technique is sensitive and specific for the detection and differentiation of cutaneous leishmaniasis agents and can be recommended to applied in hospitals and research centers.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Dietary Assessment of energy drinks from the standpoint of the athletes in the city of Baghdad - study Astpianih
...Show More Authors

The energy aimed at examining the mode of energy drinks consumption among athletes in
Baghdad and assessing their drinks were spread greatly among the athletes and students. This
study impression toward such drinks. The study sample comprised of 102 mal athletes aged
between 19-27 years and selected randomly .The obtained results showed that football was
most practiced among the test samples at 40.54% based on twice daily .The athletes
consumed one can each day at 41.18% .As the data on energy drinks was supplied from
friends .The prefared period for drinking was before or during exercise .The athletes thought
that there products can provide energy ,vitamins ,tell ale materials ,does not affect
appetite.The most f

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Redesign of Jobs in the Division of Blood Transfusion Services of the Baghdad Health Directorate Rusafa Case Study
...Show More Authors

     The purpose of the theme of redesign of jobs one of the topics the task that offers the possibility for individuals to perform several tasks in the organization of health at the same time gain experience and diverse skills and achieve compatibility between the requirements of the most appropriate function and organization  of the hand ,hence, the idea of studying the redesign of jobs of the division of blood transfusion services in the department of health Baghdad Rusafa to change the conventional methods used in the performance of functions ,which are no longer able to meet the needs of patients where blood transfusion is a key  ingredient in health care and equal access to safe blood is needed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Psychological and Social Climacteric Changes upon Quality of Life of Middle Age Women in Baghdad City
...Show More Authors

Objective: to assessthe impact of psychological and social climacteric changes on quality of life among
middle age women in Baghdad city
Methodology: : A descriptive analytic study was conducted to study the quality of life among middle age
women due topsychological and social climacteric changes from February 2013- July 2013. A purposive
sampleconsisted of three hundred (300) womenaged (40-65) years who were attending health centers in two
sectors in Baghdad / AL- Russafa andAL- karhk . The data were collected through using interview technique ,
and questionnaire format , which comprises two parts, first part consist (socio-demographic characteristic , the
second part quality of life domains (psychological and socia

... Show More
View Publication Preview PDF