Preferred Language
Articles
/
PBcYjJIBVTCNdQwCBbVd
Molecular Detection of Agglutinin-Like Sequence 1 Gene in Candida albicans that is Isolated from Diabetic Foot Patients
...Show More Authors
Objectives:

Candida albicans is a microbe living within the natural human flora and is found in the upper respiratory tract, mouth, intestines, and vagina. C. albicans is able to cause infections that range from superficial infections of the skin to life-threatening systemic infections.

Aim of Study:

Detection of virulence gene agglutinin-like sequence (ALS) 1 by using molecular technology from clinical samples (C. albicans) that is isolated from ulcers of diabetic foot patients.

Materials and Methods:

This work was done on 235 patients who had diabetic foot patients admitted to the Specialized Center for Endocrinology and Diabetes (Baghdad Health Department/Rusafa) for the treatment of diabetic foot ulcers during November 2020 till March 2021. The collected samples of diabetic foot ulcers were cultured on different media (Sabouraud's dextrose agar with chloramphenicol for selective isolation and culturing of yeasts and HiCrome Candida Medium) for isolation of C. albicans fungus as well as automated biochemical test VITEK 2 system. The ALS1 virulence gene was detected by polymerase chain reaction using newly designed primers with a molecular size (419 bp).

Results:

Out of 235 Diabetic Foot Ulcer (DFU) cases, C. albicans were isolated in 20 (8.5%) patients (12 males and 8 females) of diabetic foot ulcers. In this study, the incidence of C. albicans infection at age [50–59 years] group was [40%], and increased at age group [60–69 years] to [55%], which represents the highest incidence of infection, then decreased in the age group [79–79 years] to [5%]). Seventy-five percent of the isolates were ALS1 gene positive.

Conclusions:

Diabetic people are more susceptible to infections due to their hyperglycemic environment and reduced immunity. The use of HiCrome Candida Identification Media with VITEK 2 system can help reduce the unnecessary steps of microorganism identification process. C. albicans infection is more common in males the females regarding diabetic foot ulceration. Majority of diabetic foot ulcers occur in older adults. ALS gene might be associated with diabetic foot ulceration.

Crossref
View Publication
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Cancer Patients’ Experiences and Understanding of Venous Thromboembolism
...Show More Authors

Background: Venous thromboembolism (VTE), comprising deep vein thrombosis (DVT) and pulmonary embolism (PE), presents an extra challenge in the management of patients with cancer, given the increase in morbidity and mortality in having both conditions. Cancer patients are well known to have a high risk of VTE; particularly; those who have had major surgery, chemotherapy and/or hormonal therapy. These groups of patients need to understand the risk factors and the prophylactic measures to prevent developing VTE. This review aims to provide an overview of the literature on cancer patients’ understanding of VTE and their experiences of cancer-associated thrombosis (CAT).

Method: A scoping review wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Linguistic Analysis as Mean of Soliciting Patients concerns
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
STATISTICAL ANALYSIS OF PATIENTS INFECTED WITHCORONAVIRUS USING MANOVA
...Show More Authors

Statistics has an important role in studying the characteristics of diverse societies. By using statistical methods, the researcher can make appropriate decisions to reject or accept statistical hypotheses. In this paper, the statistical analysis of the data of variables related to patients infected with the Coronavirus was conducted through the method of multivariate analysis of variance (MANOVA) and the statement of the effect of these variables.

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref