the study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Ep
... Show MoreConsidering the expanding frequency of breast cancer and high incidence of vitamin D3 [25(OH)D3] insufficiently, this investigate pointed to explain a relation between serum [25(OH)D3] (the sunshine vitamin) level and breast cancer hazard. The current study aimed to see how serum levels of each [25(OH)D3], HbA1c%, total cholesterol (TC), high density lipoprotein cholesterol (HDL-C), low density lipoprotein cholesterol (LDL-C), and triglyceride (TG) were affected a woman’s risk of getting breast cancer. In 40 healthy volunteers and 69 untreated breast cancer patients with clinical and histological evidence which include outpatients and hospitalized admissions patients at the Oncology Center, Medical City / Baghdad - Iraq. Venous blood samp
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this research, silver nanoparticles (AgNPs) were manufactured using aqueous extract of mushroom Pleurotus ostreatus. Anticancer potential of AgNPs was investigated versus human breast cancer cell line (MCF-7). Cytotoxic response was assessed by MTT assay. AgNPs showed inhibition effect at the following concentrations 12.5, 25, 50, 100 and 200 µg/ml versus MCF-7 cell line, and all treatments had a positive result. The MCF-7 cells were inhibited up to 85.14 % at the concentration 200 μg/ml of AgNPs which reduced cells viability to 14.86%, while 12.5 μg/ml of AgNPs caused 24.23% cells inhibition with reduction of cells viability to 75.77%.
The compound Fe0.5CoxMg0.95-xO where (x= 0.025, 0.05, 0.075, 0.1) was prepared via the sol-gel technique. The crystalline nature of magnesium oxide was studied by X-ray powder diffraction (XRD) analysis, and the size of the sample crystals, ranging between (16.91-19.62nm), increased, while the lattice constant within the band (0.5337-0.4738 nm) decreased with increasing the cobalt concentration. The morphology of the specimens was studied by scanning electron microscopy (SEM) which shows images forming spherical granules in addition to the presence of interconnected chips. The presence of the elements involved in the super
In this study we surveyed the dominant normal stool flora of randomly selected healthy, young (18-23 years old), unmarried (doctrinal) Iraqi college students (males and females) for the carriage of extraintestinal pathogenic E. coli (ExPEC). ExPEC virulence was detected phenotypically by mannose resistant hemagglutination of human red blood cells (MRHA) and mannose sensitive (MS) agglutination of Bakers' yeast (Saccharomyces cerevisceae). From 88 college students, 264 E. coli isolates were obtained (3 isolates per person): 123 from 41 females and 141 from 47 males. Of these isolates, 56% (149/264) caused MS agglutination of yeast cells and 4.16% (11/264) showed MRHA. Eighty two percent (9/11) of the isolates with MRHA also caused MS agglu
... Show More