Preferred Language
Articles
/
bsj-1313
Determination of Antibodies (IgG, IgM) against Toxoplasma gondii in Some Iraqi individuals by using ELISA technique
...Show More Authors

A total of 258 voluntary blood donors (males 101; females 157) in the age range of 18-52 yr among males and 18-55 yr among females were examined for Toxoplasma gondii antibodies (IgG), and (IgM) by immunological technique (Enzyme linked Immunosorbant Assay) during the period from March 2009 to April 2010. This study covered a wide range of factors including immunological, age ,sex , place of residence and symptoms that may have a possible relationship with toxoplasmosis. Results presented in this study showed clearly that 38 (14.7%) of individuals participated in this study having IgG Toxoplasma Ab, among those 10 samples (9.9%) were males and 28 samples (17.8%) were females. Moreover, we found the prevalence of IgM seropositivity in the study population to be 5.8% ,as well as, the prevalence of IgM was 1.98 % in males and 8.3% in females. In addition to , the results of current study indicated that the seroprevalence of IgG Toxoplasma antibodies are more than IgM antibodies ,besides , the peak period range of toxoplasma gondii antibodies IgG among males donors was 30 to 39 years, while among female donors, the highest detection of Toxoplasma gondii antibodies IgG was between the ages of 40 to 49. What's more, the peak age range of Toxoplasma gondii antibodies IgM among males and females donors was 19 to 29 years. In conclusion , Our study showed a high prevalence of T. gondii antibodies in healthy voluntary blood donors. It may be appropriate to include screening test (ELISA) for T. gondii also in the pre transfusion blood testing schedule.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Detection of Leishmania tropica Using Nested-PCR and Some of Their Virulence Factors in Thi-Qar Province, Iraq
...Show More Authors

Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (43)
Crossref (20)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Reducing Lost Circulation Problem by Using Rice Material
...Show More Authors

Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.

    Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.  

    This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.

     The experim

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 04 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Comparison the solutions for some kinds of differential equations using iterative methods
...Show More Authors

This manuscript presents several applications for solving special kinds of ordinary and partial differential equations using iteration methods such as Adomian decomposition method (ADM), Variation iterative method (VIM) and Taylor series method. These methods can be applied as well as to solve nonperturbed problems and 3rd order parabolic PDEs with variable coefficient. Moreover, we compare the results using ADM, VIM and Taylor series method. These methods are a commination of the two initial conditions.

Scopus (8)
Scopus
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Nuclear Structure Investigation of Some Ni-Isotopes Using Skyrme-Hartree-Fock Method
...Show More Authors

     The nuclear ground-state structure of some Nickel (58-66Ni) isotopes has been investigated within the framework of the mean field approach using the self-consist Hartree-Fock calculations (HF) including the effective interactions of Skyrme. The Skyrme parameterizations SKM, SKM*, SI, SIII, SKO, SKE, SLY4, SKxs15, SKxs20 and SKxs25 have been utilized with HF method to study the nuclear ground state charge, mass, neutron and proton densities with the corresponding root mean square radii, charge form factors, binding energies and neutron skin thickness. The deduced results led to specifying one set or more of Skyrme parameterizations that used to achieve the best agreement with the available experimental

... Show More
View Publication Preview PDF
Crossref