Preferred Language
Articles
/
ERfiFpMBVTCNdQwCtsbk
Detection of coxsackie virus B and measurement level of Tumor necrosis factor alpha in patients suffered in T1DM with coxsackie virus infection
...Show More Authors

Objective. Infection with Coxsackie virus. This virus that damages pancreatic cells, has long been linked to the onset of insulin-dependent diabetic mellitus (IDDM). Pro-inflammatory cytokines can be produced as a result of this illness. Tumor necrosis factor-a is one of these pro-inflammatory cytokines. Materials and Methods. Blood sample were collected from 180 Iraqi participants. Ninety of them is type 1 diabetic patients and other 90 is healthy control .both groups were tested for the incidence of Coxsackie virus B IgG. So the patients groups is divided to two groups according to sero positivity of CVB-IgG .all 180 patients tested to measure of level of TNF-α. Results. The Results showed increasing in levels of TNF-α in CBV positive Type 1 Diabetes mellitus was (34.85 ± 11.00 pg/ml). The level of this interleukin in Type 1 Diabetes mellitus negative to that virus was (26.16 ± 7.79 pg/ml). While the results of this interleukin in control group was (13.82 ± 3.93 pg/ml) with p-value 0. Conclusion. The concentration of TNF-α, according to results, has been shown to be associated with type 1 diabetes mellitus patients infected with CVB-IgG and diabetic patients without CVB.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Jul 01 1999
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
Hymenopterous parasites of cockroaches in Iraq with description of new species
...Show More Authors

An attempt was made to determine the insect parasites of cockroaches in Iraq. As a result of this survey three species of Hymenoptera representing two separate families, which have been reared from ootheca of cockroaches were recovered. These were: Evania dimidiata Fabricius, Evania appendigaster (Linnaeus) (Evaniidae) and Anastatus longicornis sp. n. (Eupelmidae) which described here as a new species from Iraq.

View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Survey of Insects Associated with some Species of Cucurbitaceae in Iraq
...Show More Authors
Abstract<p>Due to the spread of insect pests that destroys the crops belonging to the Cucurbitaceae family and led to deterioration in crop productivity in Iraq due to various reasons, the most important of which is Climate fluctuation and extreme weather events have a major impact on this problem. So, this paper was proposed to identify those species pests and prevalence. Insects were collected during the period from March 1. 2022 to October 30, 2022 from the several regions of Iraq, including: Baghdad, Babylon, Basra, Karbala, Wasit, Diyala, Saladin, and Duhok Provinces. The results showed 19 important species under 17 genera with 13 families, and five orders. The most common synonyms and dist</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Psychological Distress in Women upon Coping with Breast Cancer: Coping with Breast Cancer
...Show More Authors

Objective(s): To determine the impact of psychological distress in women upon coping with breast cancer.

Methodology: A descriptive design is carried throughout the present study. Convenient sample of (60) woman with breast cancer is recruited from the community. Two instruments, psychological distress scale and coping scale are developed for the study. Internal consistency reliability and content validity are obtained for the study instruments. Data are collect through the application of the study instruments. Data are analyzed through the use of descriptive statistical data analysis approach and inferential statistical data analysis approach.

Results: The study findings depict that women with breast cancer have experien

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
SURVEY WITH REVISED CHECKLIST OF COMPOSITAE IN THE HERBARIUM OF IRAQ NATURAL HISTORY RESEARCH CENTER AND MUSEUM
...Show More Authors

A survey and revised checklist of the species belonging to the family of Compositae for the specimens which are collected and deposited previously at the herbarium of the Iraq Natural History Research Center and Museum, in addition to the current specimens collected for the period 2016-2021. A total of 85 species belonging to 49 genera and 16 tribes are revised with their synonyms, locality, and distributions, flowering and fruiting period.

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
J Dermatol Venereol
Clinical and histopathological evaluation of pigmented morphea with new insight in relation to etiopathogenesis of the disease
...Show More Authors

KE Sharquie, AA Noaimi, E Abdulqader, WK Al-Janabi, J Dermatol Venereol, 2020 - Cited by 6

View Publication
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Physics: Conference Series
The Bifurcation analysis of Prey-Predator Model in The Presence of Stage Structured with Harvesting and Toxicity
...Show More Authors
Abstract<p>For a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E<sub>0</sub> the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E<sub>1</sub> and E<sub>2</sub> happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened. </p> ... Show More
View Publication
Crossref (1)
Crossref