Preferred Language
Articles
/
MobvPIYBIXToZYALX4Ah
Detection of Single Nucleotide Polymorphisms (SNPs) for Genes Cause Drug-Resistant in Iraqi Mycobacterium Tuberculosis isolates by new Pyrophosphate Technique.
...Show More Authors

In this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP were supplemented and incubated for 1 min. ATP is synthesis by convert Pyrophosphate freed by DNA polymerase using pyruvate phosphate dikinase (PPDK), and the amount of ATP estimates by the firefly luciferase reaction. This technique, which does not demand expensive equipment, can be applied to rapidly monitor a one-point mutation in the gene that causes drug-resistant in mycobacterium tuberculosis. The results showed a high variation in values of ATP formation through matching and mismatch bases added. So, this assay (which required only five minutes), enable to find the gene SNP causes resistant for the specific drug.

Crossref
Publication Date
Tue Aug 30 2022
Journal Name
Research Journal Of Pharmacy And Technology
Status of HBeAg in association with other baseline tests in Iraqi patients with CHB
...Show More Authors

Chronic Hepatitis B(CHB) is a serious sequel after Hepatitis B Virus infection, although the rate of chronicity is inverse with age but it may be associated with a significant proportion of deaths related to cirrhosis and liver cancer. HBV serology and measurement of hepatocytic enzymes with viral load can predict disease prognosis and response to treatment. HBeAg refers to a high viral replication and associated with more infectivity to others. This study aimed to determine the impact of HBeAg status in chronically infected patients on various baseline tests. A total of 90 patients with CHB infection who were included in this study. Several standardized measures used for liver function tests, viral load and hepatitis B serological

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Building the News Agenda in Iraqi Newspapers and Patterns of Bias in their Sources
...Show More Authors

News are considered the most press arts that supply the target audiences with daily information and events happened inside and outside society since it is formed by depending on its resources which have a deep relation with formal corporations to gain their satisfaction in order to support their authority and spreading their domination by using mass media in editing their viewpoints and achieving wide acceptance among public opinion. In the field of technological development and changing in the fields of politics, society, culture, economics etc. inside Iraqi society and democratic transition help to convert news agenda from independent variation to a fellow variation while in the past the variation of mass media was the independent one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 27 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluating the Benefits of Using Mobile Application (diarrhea management step by step) in the Management of Diarrhea by Community Pharmacists
...Show More Authors

Diarrhea is one of the most commonly encountered minor ailments in the community pharmacies. It is associated with significant morbidity and mortality. However, the majority of pharmacists in Iraq did not manage diarrheal cases in a proper way. Therefore, the current study aimed to evaluate the benefit of a new mobile application (diarrhea management step by step) to improve the pharmacist's role in the management of diarrhea. The study was conducted from 21th September to 21th October 2021 using a pre-post design via a simulated patient (SP) technique. A validated diarrhea scenario was presented to each pharmacist by the SP twice, once before and the other after giving the mobile application to the pharmacist. Furthermore, pharmaci

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Al–bahith Al–a'alami
Contributions to Iraqi Children Press in Promoting Educational Values in Children
...Show More Authors

The researcher aims at focusing on the participations of children journalism in supplying the educational values for them. The researcher uses the survey method in addition to the method of content analysis through analyzing the content of two journals (Majalati and The Mezmar). Both of them deal with children issues.

         The researcher concludes that the two journals focus on literary arts in a way which surpasses the journalistic arts. Furthermore, the two journals have concerned with showing the positive values as well as insuring the necessity of rectifying the wrong behaviors. Finally, the researcher recommends that it is necessary to improve the employees who work with children j

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-adab Journal
Alienation in Scapegoat novel by Elie Amir
...Show More Authors

 تهدف هذه الدراسة إلى بحث ظاهرة الاغتراب في رواية " ديك الفداء " لايلي عامير ، لأن هذه الظاهرة تبدو أكثر وضوحا في هذه الرواية ، وتمثل تیارا مسيطرة على معطياتها واتجاهاتها الفكرية والفنية، خاصة أن الكاتب استطاع أن يجسد هذه الظاهرة المحورية تجسيدا فنيا متميزا ، وكشف عن طبيعة العلاقة بين عالم الواقع وعالم الحلم لدى الشخصيات، وعما تتسم به من تناقض و تعارض وتصادم و شعور بالإحباط والضياع والاغتراب. وقد اشتملت ال

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
International Journal Of Contemporary Mathematical Sciences
Approximation by Convex Polynomials in Weighted Spaces
...Show More Authors

Here, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity

Publication Date
Sun May 08 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of the relationship between the internal auditor and the external auditor on the Earnings quality in Iraqi companies listed in the Iraqi Stock Exchange
...Show More Authors

The changes that have occurred in the business environment and scientific and technological progress, as well as the complexity of administrative problems resulting from its practice of various activities, have led to an increase in the responsibilities entrusted to it, and for the purpose of achieving its strategic objectives, which has made the pillars of corporate governance an inevitable matter required by the nature of modern scientific management of the governorate, the success that companies seek is based on the fertile environment and the dialectical relationship between the individual and the company, and to achieve this success there must be a compatible and harmonious audit environment between the internal and external

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref