Body odour is the smell caused by bacteria feeding on sweat on the skin, especially in the armpit and groin area. Fifty-four volunteers from students and employees of college of Education Ibn Al- Haitham, were surveyed. Data were obtained concerning: subject details and microbial examination. The following conclusions were reached: 1) coagulase negative Staphylococcus was the most common isolate. 2) The most effective antibiotics were amikacin, ciprofloxacin, vancomycin, cephalothin, tobramycin, gentamycin respectively and were least sensitive to methicillin and penicillin G. 3) Alum zirconium and alum chlorohydrate were the most effective antiperspirants.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreLeft ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3
... Show MoreBackground: Myocardial infarction (MI) is distinguished by the necrosis of myocardial cells as a result of substantial and prolonged ischemia. Anxiety, problems sleeping, and feelings of depression are some of the most common psychosocial consequences of having a myocardial infarction. Aim: The purpose of this study is to evaluate the effects of post-myocardial infarction on patients' levels of anxiety, depression, and quality of sleep. Method: The collection of data from 94 individuals with MI was carried out according to a descriptive cross-sectional design. Sleep quality, depression, and anxiety were evaluated using standard questionnaires. Results: 69.1% of the participants reported having trouble getting quality sleep. The perc
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More