Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show Moreobjectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio
Pseudomonas aeruginosa is an opportunistic pathogen that causes a number of infections in immunocompromised patients. This organism appears to improve resistance to many antimicrobial agents and a high percentage of clinical isolates of P. aeruginosa exhibit multidrug resistance (MDR) phenotype . The purpose of this study is to screen the antibiotic susceptibility patterns and the prevalence of qacE delta1 gene among bacterial isolates. Accordingly, 145 samples were collected from different clinical sources from patients who admitted to different hospitals in Baghdad city in a period ranged 23/8/2018-1/1/2019. The isolates were diagnosed as P. aeruginosa based on routine b
... Show MoreThe B-type Raf kinase (BRAF) is a member of RAS\RAF\MEK\ERK pathway and this pathway can lead to increased cellular growth, invasion and metastasis. The mutated BRAF protein activates MAPK signaling pathway, results in abnormal cellular growth, apoptosis resistance, tumor progression and metastasis. Pan-BRAF is one of available BRAF monoclonal antibodies and shared by both the wild and mutant BRAF.BRAF status is mostly determined by DNA sequencing methods. In this investigation we assessed the monoclonal Pan BRAF specific antibody that can identify wild and mutant type proteins together in formalin-fixed paraffin-embedded thyroid tumor tissues by Immunohistochemistry (IHC). Archival thyroid samples from 43 iraqi patients were immunohisto
... Show MoreThis work explores the designing a system of an automated unmanned aerial vehicles (UAV( for objects detection, labelling, and localization using deep learning. This system takes pictures with a low-cost camera and uses a GPS unit to specify the positions. The data is sent to the base station via Wi-Fi connection.
The proposed system consists of four main parts. First, the drone, which was assembled and installed, while a Raspberry Pi4 was added and the flight path was controlled. Second, various programs that were installed and downloaded to define the parts of the drone and its preparation for flight. In addition, this part included programs for both Raspberry Pi4 and servo, along with protocols for communication, video transmi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The present study aimed to try to find natural substances stimulate the production of bacteriocin, as well as "for detection of bacteriocin producing isolates. Two hundred and eighty ( 280) bacterial isolates, gram negative only, were collected from 760 different pathogenic samples, consist: (Urinary tract infection, septicemia, Vaginal inflammation and diarrhea). The isolated bacteria are: Escherichia coli, Klebsiella pneumonia Pseudomonas aeruginosa,, Salmonella typhi, Enterobacter cloacae, Acinetobacter baumannii, Serratia liquefaciens, Citrobacter freundii, Proteus mirabilis and Serrattia odorifera. Cup assay method was used to detect bacteriocin production. Loc
... Show MoreReactive arthritis (ReA) is an incendiary joint inflammation that occurs few days to weeks after a gastrointestinal or genitourinary infection. The etiology of the disease is not well-known. Therefore, the present study included 80 females and 25 males, divided into 51 patients with reactive arthritis and 54 healthy individuals as control group. The study involved the detection of serum levels of anti-rheumatoid factor and anti-cyclic citrullinated peptide antibodies (anti-CCP) as well as those of CRP and C3 in all subjects. In addition, EBV levels were detected by Real Time-PCR technique. The results showed significantly increased levels (P < 0.05) of CRP, C3 and anti-CCP Ab in ReA patients’ group compared to th
... Show MoreToday’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin
... Show More