Preferred Language
Articles
/
bsj-2435
Detection of Chlamydia pneumoniae in Ankylosing Spondylitis Patients
...Show More Authors

Ankylosing spondylitis is a complex debilitating disease because its pathogenesis is not clear. This study aims at detecting some pathogenesis factors that lead to induce the disease. Chlamydia pneumoniae is one of these pathogenesis factors which acts as a triggering factor for the disease. The study groups included forty Iraqi Ankylosing spondylitis patients and forty healthy persons as a control group. Immunological and molecular examinations were done to detect Chlamydia. pneumoniae in AS group. The immunological results were performed by Enzyme-Linked Immunosorbent Assay (ELISA) to detect anti-IgG and anti-IgM antibodies of C. pneumoniae revealed that five of forty AS patients' samples (12.5%) were positive for anti-IgG and IgM C. pneumoniae antibodies compared to controls which revealed seronegative. Molecular detection included 16srRNA and HSP-70 genes were to ensure the serological examination for detection of bacteria in the five blood samples which were positive; therefore, these results improved that C. pneumoniae played a role in the pathogenesis of the disease

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (44)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jul 11 2019
Journal Name
Journal Port Science Research
Evaluation Activity of Alanine Aminopeptidase (AAP) in Patients with Renal Dialysis, Purification and Isolation of Isoenzymes
...Show More Authors

Publication Date
Thu Oct 03 2013
Journal Name
J. Of University Of Anbar For Pure Science
Determination of thyroid hormone levels in the serum of Non- dialyzed patients with chronic renal failure
...Show More Authors

Thyroid hormones, triiodothyronine (T3) and thyroxin (T4) play an important role in growth, development, and physiology of the kidney. The kidney has a central role in metabolism and clearance of these hormones as well as thyroid – stimulating hormone (TSH). Chronic renal failure (CRF) is a state of irreversible deceleration in renal function results in alterations in internal milieu, which affects the synthesis and secretory rate of hormones. To evaluate the thyroid hormone levels in non-dialyzed patients with chronic renal failure (CRF); 24 patients with CRF aged 30-70 years, mean±S.d. (48.458 ± 13.569) and 48 healthy volunteers who served as controls aged 30-70 years (43.104 ± 12.387) were studied for their thyroid function status u

... Show More
Publication Date
Sat May 23 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of light smoking on salivary levels of alkaline phosphatase and osteocalcin in chronic periodontitis patients
...Show More Authors

Background: Chronic periodontitis is an inflammatory disease that affects the supporting tissues of the teeth and it’s common among adults. Smoking is an important risk factor for periodontitis induces alveolar bone loss. Alkaline phosphatase enzyme is involved in the destruction of the human periodontium. It is produced by many cells such as polymorphonuclear leukocytes, osteoblasts, macrophages and fibroblasts within the area of the periodontium and gingival crevice. Osteocalcin is one of the most abundant matrix proteins found in bones and the only matrix protein synthesized exclusively there. Smaller Osteocalcin fragments are found in areas of bone remodeling and are actually degradation products of the bone matrix.The purpose of

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 05 2010
Journal Name
Baghdad Science Journal
Chemotherapy Effects on the Activities of Some Purine Metabolic Enzymes in Sera of Ovarian Cancer Patients
...Show More Authors

Adenosine deaminase (ADA; Ec: 3.5.4.4), 5´- Nucleotidase (5´– NT; Ec: 3.1.3.5), and AMP – amino hydrolase (AMP – deaminase AMPDA; Ec: 3.5.4.6) activities were measured in sera of ovarian cancer patients before surgery, and after chemotherapy. The results indicated that ADA specific activity increased significantly (P<0.05), while 5´-NT and AMPDA specific activity decreased significantly (P<0.05) in ovarian cancer patients before surgery in comparison with those of their corresponding control women and benign tumors groups. When the activities of these enzymes were measured after chemotherapy, a significant decrease (P<0.05) in ADA activity, and a significant increase (P<0.05) in 5´- NT and AMPDA activities w

... Show More
View Publication Preview PDF
Crossref