Preferred Language
Articles
/
bsj-999
Estimation of Immunoglobulins and complements and Using Enzyme linked Immuno sorbant Assay in Identification of Vulvovaginal candidiasis
...Show More Authors

This study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Federated states of monks in the holy Quran (Study and analysis)
...Show More Authors

Thank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
The New Iraqi Journal Of Medicine
Seroprevalence of Hepatitis B and Hepatitis C virus infection in Iraq.
...Show More Authors

Publication Date
Sat Jun 15 2024
Journal Name
Al-academy
Aesthetic Composition Systems of Writings and Texts in Contemporary Arab Sculpture
...Show More Authors

ملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهم

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Current Research In Microbiology And Biotechnology
Serodiagnosis of Human Cytomegalovirus in Iraqi Breast cancer and fibroadenoma patients
...Show More Authors

Human cytomegalovirus (HCMV) has a worldwide distribution and extremely common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers especially breast cancer. In Iraq, the incidence of breast cancer generally exceeds any other type of malignancies among Iraqi population. The study was performed in the period between October 2016 and June 2017 in Central public health laboratory/Baghdad. It involve samples from 90 women including 60 breast cancer patients, 20 benign tumor patients, and 10 normal breast tissues. A blood sample was obtained from each woman included in this study. Anti-HCMV IgG antibody was presented in 9/10 (90%) of normal women, benign breast tumor patients 19/20 (95%) and malig

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Asian Biomedicine
The distribution of cutaneous leishmaniasis in Iraq: demographic and climate aspects
...Show More Authors

AbstractBackgroundLeishmaniasis is endemic in Iraq, where both cutaneous and visceral forms of the disease are reported.ObjectivesTo determine the prevalence of cutaneous leishmaniasis (CL) and to identify associations of CL with age, sex, season, and provinces depending on some demographic and climatic aspects.MethodsThis study is retrospective and includes reported cases of infections using the available surveillance database taken from the Iraqi Ministry of Health for the years 2011, 2012, and 2013 for all provinces of Iraq.ResultsMen and boys were found to be at higher risk for CL compared with women and girls. The majority of cases were recorded among those in age groups 5–14 and 15–45 years old. Most cases were recorded from lowla

... Show More
View Publication
Scopus (20)
Scopus
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
The general requirement and the disagreement of the fundamentalists in it
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

In this research, I will deal with the significance of the imperative and the disagreement of the fundamentalists in the general requirement by dividing it into an introduction and two sections. , and the appropriate indication.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref