This study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra
Missing data is one of the problems that may occur in regression models. This problem is usually handled by deletion mechanism available in statistical software. This method reduces statistical inference values because deletion affects sample size. In this paper, Expectation Maximization algorithm (EM), Multicycle-Expectation-Conditional Maximization algorithm (MC-ECM), Expectation-Conditional Maximization Either (ECME), and Recurrent Neural Networks (RNN) are used to estimate multiple regression models when explanatory variables have some missing values. Experimental dataset were generated using Visual Basic programming language with missing values of explanatory variables according to a missing mechanism at random general pattern and s
... Show MoreBreast cancer (BC) is the most commonly diagnosed cancer in women. The metabolism of iron is closely regulated by hepcidin which exerts its action by interacting with a ferroportin.
The aim of the present study was to assess the alterations in the levels of some serum biomarkers that have a role in iron homeostasis (hepcidin and ferroportin) in addition to hematological parameters (hemoglobin, leukocyte and platelets count) in different stages of BC.
This study included 66 women with BC. The patients were categorized as follows : group 1 includes :22 patients with stage I disease ,group 2 includes: 22 patients with stage II disease ,and group 3 include: 22 patients with stage III disease .Group 4 includes :22 appare
... Show MoreThree hospitals were chosen for the present (Maternity hospital, Raperin hospital and Rhizgari hospital) survey within Erbil city, 36 water samples were collected at regular monthly interval periods beginning at January to December 2012. Microbial analysis was done by selective medium and biochemical tests and the isolated bacteria from those hospitals were Eshcerichia coli, Acinetobacter lowffii, Klebsiella pneumoniae, Moraxilla spp., Salmonella Typhi, Citrbtobacter freundii, Vibrio fluvials, Acinetobacter haemolyticus, Weeksella zoohelcum, Pasteurella multicida, and Pseudomonas aeroginosa. E. coli isolates were subjected to antimicrobial susceptibility testing. In vitro activities of 10 different antibiotics against E. coli isolates we
... Show MoreThis study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreRecently, microalgae have become a promising source in the production of biofuel. However, the cost of production is still the main obstacle to develop of this type of source. Although there are many extensive studies on the requirements provided for the cultivation of the microalgae, the study of the process, via the variables that affect the cultivation of microalgae, being still one of the important tasks to improve the production of biofuel. The present article is a serious attempt to investigate of use commercial fertilizer NPK (20:20:20+TE N: P: K) as considered a cheap nutrient medium in growth Chlorella vulgaris by comparison with traditional nutrient (Chu.10 medium). In addition, the current study addresses effect of di
... Show MoreWater salinity assessment is fundamental to the management of water resources. The objective of this research is to calculate the water quality index of the Euphrates River by using mathematical methods. As well as to evaluate the water for various uses by estimating the inorganic pollution in the river water in two sites: Samawa and Nasiriya sites. Based on physiochemical characteristics such as pH, TDS, EC, and concentrations of the major ions of calcium (Ca2+), sodium (Na+), magnesium (Mg2+), potassium (K+), sulphate (SO42-) and Chloride (Cl-), bicarbonate ions (HCO3-), and minor elements of nitrate (NO32-
... Show MoreRecently, microalgae have become a promising source in the production of biofuel. However, the cost of production is still the main obstacle to develop of this type of source. Although there are many extensive studies on the requirements provided for the cultivation of the microalgae, the study of the process, via the variables that affect the cultivation of microalgae, being still one of the important tasks to improve the production of biofuel. The present article is a serious attempt to investigate of use commercial fertilizer NPK (20:20:20+TE N: P: K) as considered a cheap nutrient medium in growth Chlorella vulgaris by comparison with traditional nutrient (Chu.10 medium). In addition, the current study addresses effect of different spar
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More