Tuberculosis status as the second leading causes of significant morbidity and mortality from an infectious disease worldwide, after human immunodeficiency virus (HIV). Sample collection was conducted at the Institute of Chest and Respiratory Diseases/Baghdad Medical City in Baghdad. The collection interval was from August to October 2014, 629 suspected TB patients were examined during this period. The results revealed among total 629 specimens, 56 (8.9%) of the specimens were positive by direct examination and 573 (91.1%) negative specimens by smear microscopy. Fifty six DNA samples were extracted from positive ZN smears of sputum specimens and 40 samples from healthy persons (as control) were subjected to molecular diagnosis by real time PCR to detect and differentiate of M. tuberculosis, M. bovis and M. bovis BCG. The results were clarified that the 48 samples (85.72%) were M. tuberculosis, 2 samples (3.57%) were mixed of M. tuberculosis and M. bovis, no M. bovis BCG was detected, and 6 (10.71%) were negative. These findings propose that M. bovis plays a minor role compared to M. tuberculosis in the etiology of pulmonary tuberculosis in Baghdad.
Karbala province regarded one part significant zones in Iraq and considered an economic resource of vegetation such as trees of fruits, sieve and other vegetation. This research aimed to utilize Normalized Difference Vegetation index (NDVI) and Subtracted (NDVI) for investigating the current vegetation cover at last four decay. The Normalized Difference Vegetation Index (NDVI) is the most extensively used satellite index of vegetation health and density. The primary goals of this research are gather a gathering of studied area (Karbala province) satellite images in sequence time for a similar region, these image captured by Landsat (TM 1985, TM 1995, ETM+ 2005 and Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such gap filli
... Show MorePhase change materials are known to be good in use in latent heat thermal energy storage (LHTES) systems, but one of their drawbacks is the slow melting and solidification processes. So that, in this work, enhancing heat transfer of phase change material is studied experimentally for in charging and discharging processes by the addition of high thermal conductive material such as copper in the form of brushes, which were added in both PCM and air sides. The additions of brushes have been carried out with different void fractions (97%, 94% and 90%) and the effect of four different air velocities was tested. The results indicate that the minimum brush void fraction gave the maximum heat transfer in PCM and reduced the time
... Show MoreUltrasonic Extraction method followed by gradient HPLC was carried out for the simultaneous determination of four insecticides are [imidacloprid (Imi), thiamethoxam (Thi), indoxacarb (Ind) and abamectin (Aba)] used to combat the major insect pests in Iraq, whitefly, Dubas Bug, worms fruits as well as to combat the spiders – dream respectively in eco-soil samples. The extraction recovery was in the range of 99.77 to 109.1 %. The dissipation kinetics and residual levels of these insecticides in soil sample was studied under field ecosystem. The half-life of the mix insecticides was determined. The half-life was in range of 0.38 to 4.06 days with the soil samples were brought from the Agricultural Land called Nahrawan located in th
... Show MoreData of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More