Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of blood donations. In this study, genotypes (A, B, C and D) were detected, largely associated with blood donors residences and distributed to areas of Iraq through a map. Genotype A comprised 28 (34.6%) of blood donors and for genotype C it was 16 (19.8%) and both genotypes were found to be the predominant genotypes, followed by genotype B of 7 (8.7%) and D of 2 (2.5%), the latter is included into Mixed genotypes of 8 (9.9%), whereas, 22 (27.2%) were undetermined genotypes. Efforts should focus on these findings, which may indicate that Iraq is an endemic region of HHV-8 infection.
Öz
Arzı Kanber/Kamber hikayesi Anadolu, Rumeli, Azerbaycan, Türkmenistan ve Irak gibi Türk dünyasının birçok yerinde birden fazla varyantı bulunan, çok sevilen ve yaygın olarak anlatılan aşk ve dramatik maceralı bir halk hikayesidir. Türk halk hikayelerinin en popüler olanlarından biri sayılan Arzı Kanber/Kamber hikayesi, Anadolu'nun birçok yöresinde bilinmesine rağmen Irak Türkmenleri arasında daha çok sevildiği ve yaygın olarak anlatıldığı tespit edilen birden fazla varyantından da görülebilir. Irak Türkmenleri arasında günümüze kadar hikayenin iki varyantı tespit edilmi
... Show MoreThe study included selection six species of the fungi related to Pleurotus genus were evaluated for their ability to production of Pleurotin, one of them, Pleurotus ostreatus (P.11) was isolated and identified in the present study. Pleurotin was extracted with screening by Thin Layer Chromatography (TLC) and quantification High Performance Liquid Chromatography (HPLC). Cytotoxicity of Pleurotin extracted from P. ostreatus (P.11) grown in different sugar sources (galactose, mannitol, sucrose, dextrose and lactose) liquid media was test against three selected cancer cell lines, CaSki, MCF-7 and A549 addition to Human Non Cancer Fibroblast Cell Line (MRC-5). Pleurotin of P. ostreatus (P.11) grown in galactose induced the significant highest
... Show MoreSeventy four Iraqi breast cancer paraffin blocks were collected from patients were attended to center health laboratory, histopathology department, Bagdad, Iraq. The patients information’s which included: name, age, and the pathological stage, grade, tumor size were obtained from the clinical records of the patients also relation with sex hormones was recorded. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years peak age frequency of tumor occurred in the category of more than 40 years old. Immunohistochemical expression of her-2/neu was from total 74 cases of infiltrative ductal carcinoma cases, 27(36.49%)were positive for Her-2/neu expression, 47(63.51%) were
... Show MoreThe aim of this paper is to identify Nano-particles that have been used in diagnosis and treatment of leishmaniasis in Iraq. All experiments conducted in this field were based on the following nanoparticles: gold nanoparticles, silver nanoparticles, zinc nanoparticles, and sodium chloride nanoparticles. Most of these experiments were reviewed in terms of differences in the concentrations of nanoparticles and the method that was used in the experiments whether it was in vivo or in vitro. These particles used in most experiments succeeded in inhibiting the growth of Leishmania parasites.
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More