Preferred Language
Articles
/
bsj-2715
Using the molecular methods in detection of antibiotics resistance genes in bacteria of Typhoi (Salmonella typhi): Batool A. Shihab|Sahira Y. Rwayah|Ashna J. Faik
...Show More Authors

This study was carried out for direct detection of typhi and some of its multidrug resistance genes(tem,capt,gyrA&sul2)which encode for resistance to (Ampicillin, Chloramphenicol,Ciprofioxacin,Co-trimoxazole)by using Polymerase Chain Reaction technique .(71)blood samples for people suffering from typhoid fever symptoms depending on the clinical examination and (25)for control were collected. The results investigation for flic gene which encode for flagellin protein indicated that only (19)with percentage of (26,76%)gave appositive results while all control had a negative ones. Investigation for antibiotic resistance drug in samples which show positive results for flic gene showed that there is a multidrug for all antibiotics with (94.73%) in patients

Crossref
View Publication
Publication Date
Fri Nov 11 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytical Methods for Determination of Ketoprofen Drug: A review
...Show More Authors

Ketoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0

... Show More
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Color Image
...Show More Authors

In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (46)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Wed Feb 14 2024
Journal Name
Aip Conference Proceedings
Segmentation Moon Images Using Different Segmentation Methods and Isolate the Lunar Craters
...Show More Authors

Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and ge

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Wed Feb 14 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Segmentation moon images using different segmentation methods and isolate the lunar craters
...Show More Authors

Segmentation is the process of partition digital images into different parts depending on texture, color, or intensity, and can be used in different fields in order to segment and isolate the area to be partitioned. In this work images of the Moon obtained through observations in Astronomy and space dep. College of science university of Baghdad by ( Toward space telescopes and widespread used of a CCD camera) . Different segmentation methods were used to segment lunar craters. Different celestial objects cause craters when they crash into the surface of the Moon like asteroids and meteorites. Thousands of craters appears on the Moon's surface with ranges in size from meter to many kilometers, it provide insights into the age and geology

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Biological & Immunological Effect of Ozonated Water on Certain Skin Pathogenic Bacteria In vivo
...Show More Authors

This in vivo study was conducted to investigate the effect of different concentrations of ozonated water on experimentally skin infection with some of bacterial isolates (Pseudomonas aeruginosa and Staphylococcus aureus ) which Showed dermal infection in experimental animals after 48 hours of exposure to these Microorganisms. Results revealed that ozone has the power to accelerated the healing process depending on the perfect concentration of ozonated water used and the severity of infection & nature of causative agent , in which the recovering period was 7 days for the infection caused by P. aeruginosa and 5 day for S.aureus by using the concentration 60 µg/ml . Results also indicated in this study the stimulated effect of O

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Detection of Chlamydia pneumoniae in Ankylosing Spondylitis Patients
...Show More Authors

Ankylosing spondylitis is a complex debilitating disease because its pathogenesis is not clear. This study aims at detecting some pathogenesis factors that lead to induce the disease. Chlamydia pneumoniae is one of these pathogenesis factors which acts as a triggering factor for the disease. The study groups included forty Iraqi Ankylosing spondylitis patients and forty healthy persons as a control group. Immunological and molecular examinations were done to detect Chlamydia. pneumoniae in AS group. The immunological results were performed by Enzyme-Linked Immunosorbent Assay (ELISA) to detect anti-IgG and anti-IgM antibodies of C. pneumoniae revealed that five of forty AS patients' samples (12.5%) were positive for anti-IgG and IgM C. pneu

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Detection of selected cells in multi choice sheets
...Show More Authors

0

View Publication Preview PDF