The current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the effect also increase
Introduction and Aim: Pseudomonas aeruginosa is a nosocomial infection with an ability to develop high levels of antibiotic resistance. The efflux pump system is one of the mechanisms that is linked to multidrug resistance in P. aeruginosa. In this study, we employed siRNA loaded on gold nanoparticles against the MexA efflux pump gene to decrease the MexA gene expression in P. aeruginosa and estimated antibiotic resistance after gene silencing. Materials and Methods: This study examined four strains of P. aeruginosa isolated from patients in various hospitals in Baghdad. Bacteria isolated were identified by biochemical tests and Vitek compact 2 system. Single-stranded siRNA (33bp) designed in this study was loaded onto gold
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA new method for construction ion-selective electrode (ISE) by heating reaction of methyl orange with ammonium reineckate using PVC as plasticizer for determination methyl orange and determination Amitriptyline Hydrochloried drug by formation ion-pair on electrode surface . The characteristics of the electrode and it response as following : internal solution 10-4M , pH (2.5-5) ,temperature (20-30) and response time 2 sec. Calibration response for methyl orange over the concentrationrange 10-3 -10-9 M with R=0.9989 , RSD%=0.1052, D.O.L=0.315X10-9 MEre%=(-0.877- -2.76) , Rec%.=(97.230 -101.711) .
Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreObjectives: To identify the frequency and types of microsatellite instability among a group of sporadic CRC patients and to correlate the findings with clinicopathological characteristics. Methods: During an 8-month period, all patients with sporadic CRC who attended to two teaching hospitals in Baghdad, Iraq were recruited to this cross-sectional study regardless of age, sex, ethnicity, or tumor characteristics. Demographic, clinical, and histopathological features were recorded. DNA was extracted from FFPE-blocks of the resected tumors and normal tissues. PCR amplification of five microsatellite mononucleotide repeat loci (BAT25, BAT26, NR-21, NR-24, and MONO-27) and 2 pentanucleotide repeat control markers (Penta C and Pent
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreThe current study involves placing 135 boreholes drilled to a depth of 10 m below the existing ground level. Three standard penetration tests (SPT) are performed at depths of 1.5, 6, and 9.5 m for each borehole. To produce thematic maps with coordinates and depths for the bearing capacity variation of the soil, a numerical analysis was conducted using MATLAB software. Despite several-order interpolation polynomials being used to estimate the bearing capacity of soil, the first-order polynomial was the best among the other trials due to its simplicity and fast calculations. Additionally, the root mean squared error (RMSE) was almost the same for the all of the tried models. The results of the study can be summarized by the production
... Show More