Preferred Language
Articles
/
LRbJIosBVTCNdQwCWMgq
Identification of Pathogenic Fungi in Renal Transplant Patients by Conventional and Molecular Methods
...Show More Authors

Opportunistic fungal infections due to the immune- compromised status of renal transplant patients are related to high rates of morbidity and mortality regardless of their minor incidence. Delayed in identification of invasive fungal infections (IFIs), will lead to delayed treatment and results in high mortality in those populations. The study aimed to assess the frequency of invasive fungal infection in kidney transplant recipients by conventional and molecular methods. This study included 100 kidney transplant recipients (KTR) (75 males, and 25 females), collected from the Centre of Kidney Diseases and Transplantation in the Medical City of Baghdad. Blood samples were collected during the period from June 2018 to April 2019. Twenty one out of 100 renal-transplanted patients were infected with pathogenic fungi, four of the patients were females and 17 were males. There is an observation of a high incidence of fungemia in patients with the abnormal value of blood urea according to PCR and culture results. Referring to fungal isolates the most prevalent was Saccharomyces cerevisiae, which account for 19 isolates out of 21 the other two isolates were Zygosaccharomyces rouxii and Aspergillus flavus. The results of the current study show significant correlation between PCR and culture methods at (P<0.0009).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Mon Oct 31 2022
Journal Name
Biodiversitas Journal Of Biological Diversity
Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data
...Show More Authors

Abstract. Hassan FM, Mahdi WM, Al-Haideri HH, Kamil DW. 2022. Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data. Biodiversitas 23: 5239-5246. The biodiversity and water quality of the Diyala River require screening water in terms of biological contamination, because it is the only water source in Diyala City and is used for many purposes. This study aimed to identify a new species record of Cynaophyceae and emphasize the importance of using molecular methods beside classic morphological approaches, particularly in the water-shrinkage-aqua system. Five different sites along Diyala River were selected for Cyanophyceae identification. Morphological examination and 16S rRNA sequen

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Nov 25 2022
Journal Name
Tem Journal
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques
...Show More Authors

The Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute

... Show More
View Publication
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Night Vision monitor for IR laser spot size Identification
...Show More Authors

The aim of this research is to design and construct a
semiconductor laser range finder operating in the near infrared range
for ranging and designation. The main part of the range finder is the
transmitter which is a semiconductor laser type GaAs of wavelength
0.904 μm with a beam expander and the receiver; a silicon pin
detector biased to approve the fast response time with it's collecting
optics. The transmitters pulse width was 200ns at a threshold current
of 10 Ampere and maximum operating current of 38 Ampere. The
repetition rate was set at 660Hz and the maximum operating output
power was around 1 watt. The divergence of the beam was 0.268o
the efficiency of the laser was 0.03% at a duty cycle of 1.32x

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
International Journal Of Intelligent Systems And Applications In Engineering
Optimizing Methods of Funding Residential Complexes Projects
...Show More Authors

Scopus (3)
Scopus
Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Different Methods of Canine Retraction- Part 1
...Show More Authors

Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Different methods of canine retraction- Part 2
...Show More Authors

Background: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2007
Journal Name
Iraqi Journal Of Science
Adaptive methods for matching problem
...Show More Authors

In this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Technical methods in foreign language teaching as a new method in foreign language learning
...Show More Authors

Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"

versteht man, dass die Forschung  sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht  in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F

... Show More
View Publication Preview PDF