Preferred Language
Articles
/
_RjX65QBVTCNdQwCJCKw
Molecular Detection and Genotyping of Human Herpes Virus 8 in a sample of Iraqi Blood Donors
...Show More Authors

Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of blood donations. In this study, genotypes (A, B, C and D) were detected, largely associated with blood donors residences and distributed to areas of Iraq through a map. Genotype A comprised 28 (34.6%) of blood donors and for genotype C it was 16 (19.8%) and both genotypes were found to be the predominant genotypes, followed by genotype B of 7 (8.7%) and D of 2 (2.5%), the latter is included into Mixed genotypes of 8 (9.9%), whereas, 22 (27.2%) were undetermined genotypes. Efforts should focus on these findings, which may indicate that Iraq is an endemic region of HHV-8 infection.

Scopus Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Changes in the EEG amplitude as a biomarker for early detection of Alzheimer's disease
...Show More Authors

The rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage in the brain due to AD leads to changes in the information processing activity of the brain and the EEG which ca

... Show More
View Publication
Scopus (24)
Crossref (13)
Scopus Crossref
Publication Date
Wed Apr 02 2014
Journal Name
Journal Of Theoretical And Applied Information Technology
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by usin

... Show More
Scopus (48)
Scopus
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (33)
Crossref (21)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
BLOOD PARASITES OF SOME PASSERIFORM BIRDS IN BAGHDAD AREA, CENTRAL IRAQ
...Show More Authors

Examining of passeriform birds collected in Baghdad area revealed presence of seven species of blood parasites belonging to three genera, Haemoproteus, Leucocytozoon, and Plasmodium. Records of microfilariae (larval nematodes) were also indicated. Results showed wide distribution of Plasmodium relictum among passerine hosts.

View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Incidence of Injuries to Major Blood Vessels in the Lower Limb
...Show More Authors

Background: Blood vessels injury is one of the most
common causes of medical emergencies that admitted to
hospitals and at the same time it regarded as one of the
most important causes of death. They may represent less
than 15% of all injuries; they deserve special attention
because of their severe complications.
Objective: The aim of the present study is to assess
anatomically the injures of major arteries and veins in the
lower limb with their management.
Methods: The present study extended from April 2006 to
February 2007, in which 65 patients with lower limb
vascular injury were examined in Emergency Department
and Forensic Medicine Department of Tikrit Teaching
Hospital in Salah-Aldin governora

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a strategy (fahs) in the development of grammar skills of a sample of secondary school Female Students in Saudi Arabia
...Show More Authors

The aim of the present research is to measure the degree of strategic effectiveness (fahs) in the development of grammar skills of high school students in the Kingdom of Saudi Arabia and to achieve the goal of the researcher the researcher used the semi-experimental approach; On ten arbitrators specializing in grammar, morphology, curricula and methods of teaching the Arabic language. After confirming the validity of the guideline, the researcher prepared an achievement test consisting of (22) paragraphs of the type of short answer and multiple choice. The researcher trained a teacher to apply the strategy to the experimental research sample using the (screening) component of (30) students, and the same parameter taught the control sampl

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Role of Strategic Leadership in Achieving University Governance Requirements: A Survey of a Sample of Teaching Staff at College of Administration and Economics/University of Mosul
...Show More Authors

Aim of the Study: The paper aims at identifying the extent of the role of strategic leadership represented by its four dimensions (administrative, transformational, political, moral) in fulfilling the requirements of university governance (Context, message and Goal, Management orientation, Independence, Issue, Sharing)

Methodology: A survey is applied to (107) members of the teaching staff at the college of Administration and Economics/ University of Mosul.  To achieve the goals of the study, the researcher makes use of a number of tools such as:  questionnaire, statistical tools and methods (repetitions, perce

... Show More
View Publication Preview PDF
Crossref