Preferred Language
Articles
/
AxjQeZQBVTCNdQwCFBom
Effect of Bacterial Infections of The Respiratory Tract System on The Activity of Rheumatoid Arthritis
...Show More Authors

Background: Several infectious lung diseases often develop in patients with Rheumatoid arthritis (RA), especially during immunosuppressive medication, including disease-modifying anti-rheumatic drugs (DMARDs). The present study aimed to determine the role of respiratory tract bacterial infection in RA activity. Methods: Blood and sputum samples were collected from 31 patients with RA and 12 healthy subjects as control. The bacterial isolates were isolated and identified in collected sputum by biochemical tests and Vitec 2 system. Results: In the present study, thirty-one patients with RA were compared with 12 healthy subjects. Eight patients with RA were not infected with pathogenic bacteria (RA-NIPB) (25.8%). Twenty-three RA patients were infected with pathogenic bacteria (RA-IPB) (74.19%). From 23 RA-IPB, 10 RA patients were infected with Staphylococcus aureus, 6 RA patients were infected with Klebsiella pneumonia, 4 RA patients were infected with Streptococcus pneumoniae, and 3 RA patients were infected with Pseudomonas aeruginosa. No pathogenic bacteria were isolated from the sputum of a healthy subjects. There was no significant difference between RA-NIPB and RA-IPB in terms of the level of disease activity score DAS28. Conclusion: The current study showed that patients with RA have a higher incidence of being infected with pathogenic bacteria than the healthy control group. No significant effect of bacterial species infection on the level of DAS28. The present study is the pioneer study that showed no effect of bacterial respiratory infections and different RA treatments on RA disease activity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
On the Representations of M-Groups
...Show More Authors

The main object of this paper is to study the representations of monomial groups and characters technique for representations of monomial groups. We refer to monomial groups by M-groups. Moreover we investigate the relation of monomial groups and solvable groups. Many applications have been given the symbol G e.g. group of order 297 is an M-group and solvable. For any group G, the factor group G/G? (G? is the derived subgroup of G) is an M-group in particular if G = Sn, SL(4,R).

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Al-farabi For Engineering Sciences Vol
Prototyping of Multi-Factors Based Vehicle Accident Detection and Reporting System Relying on GPS and GSM
...Show More Authors

Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Wed Dec 22 2021
Journal Name
Polymers
Modifications of Polymers through the Addition of Ultraviolet Absorbers to Reduce the Aging Effect of Accelerated and Natural Irradiation
...Show More Authors

The photooxidative degradation process of plastics caused by ultraviolet irradiation leads to bond breaking, crosslinking, the elimination of volatiles, formation of free radicals, and decreases in weight and molecular weight. Photodegradation deteriorates both the mechanical and physical properties of plastics and affects their predicted life use, in particular for applications in harsh environments. Plastics have many benefits, while on the other hand, they have numerous disadvantages, such as photodegradation and photooxidation in harsh environments and the release of toxic substances due to the leaching of some components, which have a negative effect on living organisms. Therefore, attention is paid to the design and use of saf

... Show More
View Publication
Scopus (68)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Analytical study on the implications of the GATS Agreement and its implications on the Egyptian banking sector
...Show More Authors

International trade in services is becoming increasingly important as it is an economic activity that deals with invisible trade, which has become increasingly important in the balance of international trade. The establishment of the WTO is a starting point in international trade relations. It is responsible for all aspects of international trade, , And in view of the continued increase in international trade in services, the need for more internationally recognized rules has become more urgent, especially as it has been increasingly proven that the traditional framework of public services is inadequate to operate some of the most dynamic and innovative sectors of the economy. (GATS) to be the regulatory framework for this sector

... Show More
View Publication Preview PDF
Crossref