Infection of the gastric mucosa with Helicobacter pylori is strongly associated with chronic gastritis, peptic ulcer and gastric cancer. Helicobacter pylori virulence factors include a variety of proteins that are involved in its pathogenesis, such as VacA and CagA. Another group of virulence factors is clearly important for colonization of H.pylori in the gastric mucosa. These include urease, motility factors (flagellin), and Superoxide dismutase (SOD). Because of this organism's microaerophilic nature and the increased levels of reactive oxygen in the infected host, we expect that other factors involved in the response to oxidative stress are likely to be required for virulence. Superoxide dismutase is a near
... Show MoreThe research focuses on determination of best location of high elevated tank using the required head of pump as a measure for this purpose. Five types of network were used to find the effect of the variation in the discharge and the node elevation on the best location. The most weakness point was determined for each network. Preliminary tank locations were chosen for test along the primary pipe with same interval distance. For each location, the water elevation in tank and pump head was calculated at each hour depending on the pump head that required to achieve the minimum pressure at the most weakness point. Then, the sum of pump heads through the day was determined. The results proved that there is a most economical lo
... Show Moreأجريت هذه الدراسة في محافظة النجف بالعراق لتحليل عينات بيولوجية من المدخنين وغير المدخنين. تم استخدام العينات، بما في ذلك مصل الدم والبول والشعر والأظافر، كمؤشرات حيوية لتحديد تركيزات اليورانيوم (UC) ونظائره (238U، 235U، و234U). وباستخدام طريقة التعرض الطبيعي، تم استخدام كاشف المسار النووي (CR-39، المملكة المتحدة) لقياس تركيزات اليورانيوم في العينات. تم جمع خمسة وسبعين عينة من مصل الدم والبول والشعر والأظافر للمد
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe study aimed to determine of some Optimum conditions for bioremediation and removing of seven mineral elements included hexavalent chromium, nickel, cobalt, cadmium, lead, iron and copper as either alone or in group by living and heat treated cells of baker’s yeast Saccharomyces cerevisiae. The dried baker's yeast from Aldnaamaya China Company was used in this study. Biochemical tests was used to ensure yeast belonging to S. cerevisiae and then used to remove the mentioned mineral elementes under different conditions which included incubation period, pH, and temperature. It was found that the best of these conditions was 60 minutes for duration of incubation, 6 for pH, 25 ᵒC for temperature. During the study the behavior of living
... Show MoreThe steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More