To determine the relationship between Helicobacter pylori infection and reproduction disorder (recurrent spontaneous abortion), twenty women patients who undergo spontaneous abortion during first trimester of pregnancy (20-38) years and have been investigated from 2015/12/1 -2016/3/1 and compared to fifteen healthy individuals. All subjects were carried out to measure anti-H. pylori IgA and anti- H. pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA). There was significant elevation (p≤ 0.05) in concentration of anti- H. pylori IgG Abs (6.30± 0.99) compared to control group (4.48± 0.61) and IgA Abs (5.42 ± 0.90 U /ml) as compared to control group (3.92 ± 0.41 U/ml). The percentage of H. pylori IgG and IgA was 20% and 25%, respectively. There was high significant (P ≤ 0.01) difference between control and test groups. While, there was no significant differences (P > 0.05) in the concentration of IgA and IgG of H. pylori according to the age. These results indicate that infection with H. pylori play an important role in reproduction disorder of spontaneous abortion.
Type 2 diabetes mellitus (T2DM) became the most prevalent health problem. Almost half of the world's people are ignorant that have diabetes. Menopause occurs as an important alteration in women through which take place the change in sex hormones, distribution in fat،s body, and metabolism, altogether which participate in the metabolism disease such as type 2 diabetes mellitus. Several studies have appeared the association between the TCF7L2 gene and different diseases like type 2 diabetes mellitus (T2DM). This study aimed to detect the relation of the genetic variation polymorphism for the TCF7L2 gene (rs12255372 G/T) in Iraqi women menopausal with T2DM. The outcomes indicated the increased levels of biochemical characteristics including H
... Show MoreBackground: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreAbstract The purpose of this paper is preparing exercises according to some biomechanical variables for women with low back pain and identifying the effect of exercise according to some biomechanical variables and relieving lower back pain for women. The researchers used the one-group experimental design. The sample was chosen by the intentional method to provide the necessary conditions for conducting the study, and they represent the research community and its sample. The researchers also excluded (2) of the injured women because they did not adhere to the rehabilitation sessions, and for the purpose of ensuring the homogeneity of the sample members, the researchers used the arithmetic mean, standard deviation, and the torsion coefficient
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreThis paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good