Preferred Language
Articles
/
WRa2vYgBVTCNdQwCBoF-
Detection of sul1 resistance gene in Acinetobacter baumannii from different Clinical cases
...Show More Authors

Publication Date
Wed Nov 23 2022
Journal Name
Dental Hypotheses
Remineralization of Dentine Caries Using Moringa Oleifera Based Nano-Silver Fluoride: A Single-Blinded, Randomized, Active-Controlled Clinical Trial
...Show More Authors

View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jul 14 2022
Journal Name
Egyptian Journal Of Medical Human Genetics
A single-nucleotide polymorphism of IL12A gene (rs582537 A/C/G) and susceptibility to chronic hepatitis B virus infection among Iraqi patients
...Show More Authors

A case–control study (80 patients with chronic hepatitis B virus [HBV] infection and 96 controls) was performed to evaluate the association of an IL12A gene variant (rs582537 A/C/G) with HBV infection. Allele G showed a signifcantly lower frequency in patients compared to controls (31.2 vs. 46.9%; probability [p]=0.009; corrected p [pc]=0.027) and was associated with a lower risk of HBV infection (odds ratio [OR]=0.49; 95% confdence interval [CI]=0.29–0.83). A similar lower risk was associated with genotypes CG (17.5 vs. 29.2; OR=0.25; 95% CI=0.08–0.81; p=0.02) and GG (10.0 vs. 16.7; OR=0.25; 95% CI=0.07–0.91; p=0.036), but the pc value was not signifcant (0.12 and 0.126, respec‑ tively). Serum IL35 levels showed signifcant difere

... Show More
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 24 2023
Journal Name
Archives Of Razi Institute
PCR-RFLP Analysis of Insulin-Like Growth Factor 2 Gene Polymorphisms in Two Commercial Broiler Chicken Strains (Cobb 500 and Hubbard F-15) and Their Associations with Performance Traits
...Show More Authors

The present research aimed to study the polymorphisms of the chicken insulin-like growth factor 2 (IGF2) in two commercial broiler breeds (Cobb 500 and Hubbard F-15). In total, 300 avian blood samples were obtained. The genomic DNA was isolated using a fast salt-extraction technique. Moreover, polymerase chain reaction (PCR) was used to amplify 1146 bp fragments of the gene. The amplified fragments were subjected to restriction enzyme digestion using the HinfI endonuclease enzyme, and the digested products were separated on a 2% agarose gel. The findings indicated that there were two alleles, T and C, for the target locus, with frequencies of 73.3% and 26.7%, respectively. Three distinct genotype variations, TT, TC, and CC, were found, with

... Show More
Preview PDF
Scopus
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (33)
Crossref
Publication Date
Thu Feb 26 2026
Journal Name
Al–bahith Al–a'alami
The agenda of the French news agency AFP in dealing with the press image of the peaceful resistance The Great Return Marches as a model "an analytical study" “A analytical study”
...Show More Authors

The study aimed to identify the treatment of the press image of the Great Return Marches in the French international news agency AFP by knowing the most important issues, their direction and the degree of interest in them. The study belongs to the descriptive research, and used the survey method, within the context of the content analysis method, and the researcher relied on the content analysis form tool and the interview tool to collect data. The study population is represented in the photos published by the French News Agency about the Great Return Marches during the period (end of March / 2018 until the end of November / 2019. The researcher chose an intentional sample using the Complete Census method. The study material represented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of medicinal compounds from botanicals using bulk liquid membrane in rotating film contactor: Recovery of vinblastine from catharanthus roseus.
...Show More Authors

The interest of application of liquid membrane (pertraction) processes for recovery of medicinal compounds from dilute ammoniacal leach solutions is demonstrated. Selectivity of the liquid membrane ensures a preferential transport of the desired solute from the native extract into the strip solution, vinblastine was successfully extracted from basic media (pH 9.2) and stripped by acidic media of sulfuric acid (pH= 1.3) applying continuous pertraction in a rotating discs contactor and using n-decane as liquid membrane. Transport of vinblastine in three-liquid-phase system was studied and performed by means of a kinetic model involving two consecutive irreversible first-order reactions. The kinetic parameters (apparent rate constants of th

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Inorganic Chemistry Communications
Detection of nitrotyrosine (Alzheimer's agent) by B24N24 nano cluster: A comparative DFT and QTAIM insight
...Show More Authors

A nano-sensor for nitrotyrosine (NT) molecule was found by studying the interactions of NT molecule with new B24N24 nanocages. It was calculated using density functionals in this case. The predicted adsorption mechanisms included physical and chemical adsorption with the adsorption energy of −2.76 to −4.60 and −11.28 to −15.65 kcal mol−1, respectively. The findings show that an NT molecule greatly increases the electrical conductivity of a nanocage by creating electronic noise. Moreover, NT adsorption in the most stable complexes significantly affects the Fermi level and the work function. This means the B24N24 nanocage can detect NT as a Φ–type sensor. The recovery time was determined to be 0.3 s. The sensitivity of pure BN na

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref