Increasingly, the availability of personal genomic data in cloud servers hosted by hospitals and research centers has incentivized researchers to turn to research that deals with analyzing genomic data. This is due to its importance in detecting diseases caused by genetic mutations, detecting genes that carry genetic diseases, and attempting to treat them in future generations. Secure query execution on encrypted data is considered an active research area in which encryption is used to ensure the confidentiality of genomic data while restricting the ability to process such data without first decrypting it. To provide a secure framework and future insight into the potential contributions of homomorphic encryption to the field o
... Show MoreIn this paper, we investigate the influence of the rotation and magnetic field on the peristaltic flow of the Bingham fluid in an asymmetric channel with a porous medium under the long wavelength and low Reynolds number approximation assumptions.
The perturbation method and the Mathematica program for solving nonlinear partial differential equations are used to couple the momentum equations with the rotational and magnetic field equations. The fluid is considered to be subject to
... Show MoreMaterials and Methods Bacterial strains P. aeruginosa was obtained from postgraduate students Laboratories of Biology Department/College of Science/University of Baghdad. That previously isolated from patient suffering from Cystic Fibrosis. API 20 NE system was employed for the identification of P. aeruginosa. A total of 122 urine specimens were collected in the period between of mid of July until to the mid of September of 2010 from AL-Kadhmiya Teaching Hospital in Baghdad City. Specimens were collected from out-patients in sterile screw cupped containers. Regarding inpatients, catheter was withdrawn and cut
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Hepatitis B and Hepatitis C viruses are the major health problem in the worldwide. In the Middle East, the prevalence of HBV in general population with the chronic infectionsis 2-5%,whereas the prevalence of HCV is about 1% in Arabian Gulf countries. World Health Organization (WHO) revealed that the risks of HBV and HCV transmissionas well as human immunodeficiency virus (HIV) through the transfusion of contaminated blood and blood products is high, because of the fragility of health services in these countries. Several viral diseases are transportby different modes like bloodtransfusion, sexual contact, and unsafe injections. The mostcommon blood-transmitted viruses are hepatitis B virus(HBV), hepatitis C virus (HCV) and humanimmunodeficie
... Show MoreIn recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression
Background: Tap waters play an important role in fulfilling the people needs for drinking and domestic purposes. Contaminate the tap water with different pollutants has become an issue of great concern for 90% of people who are depended on the tap water as the main source of drinking. Pollutants can make their way easily into the delivering pipes which suffer from the leaking resulting in decreasing the quality of water. Objective: Therefore, assess the water quality for drinking purpose by calculating the water quality index is an important tool to ascertain whether the water is suitable for human consumption or not. Methods: In the present work, the water quality of the Al-Salam, western region of Baghdad city, Iraq was investigated for 7
... Show MoreThe proposed method is sensitive, simple , fast for the determination of mebeverine hydrochloride in pure form or in pharmaceutical dosage . Using Homemade instrument fluorimeter continuous flow injection analyser with solid state laser (405 nm) as a source. Where it is based upon the fluorescence of fluorescein sodium salt and quenching effect of fluorescence by mebeverine in aqueous medium. The calibration graph was linear in the concentration range 0.05 to10 mMol.L-1 (r= 0.9629) with relative standard deviation (RSD%) for 1 mMol.L-1mebeverine solution was lower than 3% (n=6). Three pharmaceutical drugs were used as an application for the determination of mebeverine. A comparison was made between the newly developed method of analysis wit
... Show MoreThe research work represent a fast and simple method for the determination of methionine using chemiluminescence for the methionine-sodium hydroxide-luminol for the generation of a chemiluminesecent derivative of luminal. The emission was measured by continuous flow analysis made sample size of 83µL was used.Response versus concentration extended from 0.2-20 mM.L-1 with a percentage linearity of 96.17% or with 99.17% percentage of linearity for the range 0.6-20 mM.L-1. Reaching to a L.O.D. at (S/N=3) for 5 µM.L-1 from the gradual dilution for the minimum concentration in the calibration graph with a repeatability of less than 0.5% (n=10). A comparison was made between the new developed method with the classical method for the spectrophoto
... Show MoreIn this paper, we established a mathematical model of an SI1I2R epidemic disease with saturated incidence and general recovery functions of the first disease I1. Considering the basic reproduction number, we obtained conditions for both disease-free and co-existing cases. The equilibrium points local stability is verified by using the Routh-Hurwitz criterion, while for the global stability, we used a suitable Lyapunov function to analyze the endemic spread of the positive equilibrium point. Moreover, we carried out the local bifurcation around both equilibrium points (disease-free and co-existing), where we obtained that the disease-free equilibrium point undergoes a transcritical bifurcation. We conduct numerical simulations that suppo
... Show MoreIn this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the
... Show MoreThe studied succession (Lower Miocene-Early Middle Miocene) In central Iraq is distinguished by a wide range of fossils, mostly benthic foraminifera, and other fossils including bivalves, gastropods, echinoids fragments, red algae and coral are also presented. Index fossils of benthic foraminifera have been used for the purpose of determining the age of the Euphrates and Jeribe formations, because of their young age, wide geographical distribution and abundance in the selected wells.
The present study involves four selected wells of Ajil oil field and in terms of the biostratigraphy of the Euphrates, Dhiban, and Jeribe formations depending on benthic foraminifera and other associated fossils. Some of these fossils have a short ve
... Show MoreIt is becoming a public health issue to predict which expectant women will develop gestational diabetes mellitus (GDM). The goal of this case control research is to investigate the role of maternal oxidative stress levels in the first, second, and third trimesters, as well as other factors, in the development of gestational diabetes mellitus (GDM). Methods Between October and December 2021, 142 women participated in this research. The 101 GDM patients were split into three groups based on their gestation (T1, T2, and T3), and 41 healthy pregnant women were chosen as the comparison group. TAS and TOS levels of oxidative stress and XO were calculated using a Spectrophotometer for colorimetric techniques; fasting and random sugar levels, as
... Show MoreBacteriophages have the potential to eliminate both antibiotic-resistant and sensitive bacteria; as a result, they have become a major focus of such research. In contrast to antibiotics, which assault the entire bacterial population without discrimination, bacteriophages have a limited set of characteristics that allow them to target infectious microbes while avoiding friendly species (commensal microbiota). Nevertheless, large groups of naturally occurring bacteriophages that are well-differentiated and selective for the most clinically recognized pathogenic bacterial strains are required. Utilizing genetic engineering techniques that modify the target phage genome to synthesize phages with known characteristics in a brief period o
... Show MoreBackground: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete
... Show MoreComplex detection in protein-protein interaction (PPI) networks is one of the major issues facing scientific study in biological networks. In PPINs, proteins are distributed differently as groups (complexes). These groups can be identified as having a great internal density in the number of edges inside the groups while having the least possible number of edges between these groups. The most common methods for finding such complexes are evolutionary algorithms (EAs), which have been used widely in literature for this objective. Despite the reliability of these complicated detection models, they are mostly based on topological (graph) qualities, and the biological implications of the PPI networks have been rarely explored. In thi
... Show MoreCoronavirus diseases 2021 (COVID-19) on going situation in Iraq is characterized in this paper. The pandemic handling by the government and the difficulties of public health measures enforcement in Iraq. Estimation of the COVID-19 data set was performed. Iraq is endangered to the pandemic, like the rest of the world besides sharing borders with hotspot neighbouring country Iran. The government of Iraq launched proactive measures in an attempt to prevent the viral spread. Nevertheless, reports of new cases keep escalating leaving the public health officials racing to take more firm constriction to face the pandemic. The paper bring forth the current COVID-19 scenario in Iraq, the government measures towards the public health challenges, and
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreHydrochloric acid (HCl) is a substance that is frequently utilized in industrial operations for important tasks such as chemical cleaning and pickling metallic surfaces.Therefore, the corrosion inhibition ability of three newly synthesized quinazoline derivatives namely, 3-allyl-2-(propylthio) quinazolin-4(3H)-one) (APQ), (3-allyl-2-(allylthio) quinazolin-4(3H)-one) (AAQ), (3-allyl- 2-( Prop -2-yn -1-ylthio) Quinazolin - 4 (3H) - one) (AYQ) were theoretically determined and these compounds were characterized using Fourier Transform Infra-Red (FTIR) and 1H and 13C Nuclear Magnetic Resonance (NMR) spectroscopic. A series of quantum chemical properties of these derivatives: EHOMO, ELUMO, energy gap (ΔE),dipole moment (μ), hardness (η), soft
... Show More