Background:SARS-CoV-2 infection has caused a global pandemic that continues to negatively impact human health. A large group of microbial domains including bacteria co-evolved and interacted in complex molecular pathogenesis along with SARS-CoV-2. Evidence suggests that periodontal disease bacteria are involved in COVID-19, and are associated with chronic inflammatory systemic diseases. This study was performed to investigate the association between bacterial loads of Porphyromonas gingivalis and pathogenesis of SARS-CoV-2 infection. Fifty patients with confirmed COVID-19 by reverse transcriptase-polymerase chain reaction, their age ranges between 20-76 years, and 35 healthy volunteers (matched accordingly with age and sex to the patients) participated in this case control study. Oral hygiene status was determined by the simplified oral hygiene index. Blood and saliva samples were obtained from patients and controls, Porphyromonas gingivalis quantification from extracted DNA of blood and saliva samples performed by means of real-time polymerase chain reaction. The present result revealed that the quantity of salivary Porphyromonas gingivalis was significantly higher (p=0.003) in the patients’ group than in the controls group, while there was no significant difference in the number of bacteria in the blood samples between the two groups. Moreover, the number of bacteria in severe cases was higher than that in moderate and mild with no significant differences, and there was a significant increase in the number of bacteria among patients with poor oral hygiene compared to patients with good oral hygiene. This study demonstrated that the high level of salivary Porphyromonas gingivalis in patients increases in number with disease severity, which may indicate that bacterial infections contribute to the spread of the disease.
Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreMedical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R
... Show MoreThe study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, (Central Children Hospital and Children's Protections Educational Hospital) The Iraqi Ministry of Health, the Department of Health Baghdad .the period from the first of 2015 September to the first of December 2015, Were obtained isolates bacterial subjected to the cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system .The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar, golden yellow color on the Trypton Soy agar and green color on t
... Show MoreThis work is related to the investigation of the effects of porous silicon (PSi) morphologies on the performance of plasmonic gold nanoparticles (Au-NPs) hot spot SERS sensors for the detection of amoxicillin molecules. Two Si wafers with different resistivity values of 10 and 100 Ω.cm were used to synthesize a PSi layer of pores- and mud-like structures, respectively, by pulsed photo chemical etching process. The hot spot SERS sensors were synthesized by incorporating the Au-NPs within the PSi morphologies of pores- and mud- like structures which are characterized by high density of nucleation sites. Plasmonic Au- NPs with different sizes and hot spot regions were incorporated into the porous structures by the ion reduction proces
... Show More