Climate change is a global environmental issue and a common concern for humanity, and it is an inevitable result of civilization development, especially after the industrial revolution All areas of life At the level of the Iraqi situation , Iraq faces several challenges posed by Climate change , Such as high temperature, lack of rain, water scarcity , land salinity , and the increase in the proportion of sand and dust storms and the resulting disasters, which impedes development and hinders efforts to reduce poverty , enhance livelihoods , and reduce conflict to obtain natural resources. On the other hand, women are more vulnerable to climate change due to their dependence on natural resources their daily roles in life and their social and economic situation , especially in developing countries such as Iraq.
This study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show More