The aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid
... Show MoreThe current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,
... Show MoreThe follower of the needs of the users of accounting information notices the necessity of adopting faithful representation of information Hence, IASB adopted the economic substance approach as the basis for the Formulation and development of international accounting standards Therefore, this research discusses the reflection of the economic phenomenon in terms of its economic substance on the subject of measurement , And it should be consistent measurement method where the problem of research is concentrated in the fact that the economic units operating in the local environment to address events and economic phenomena according to the legal form , as appropriate With the requirements of the unified accounting sys
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreBeta thalassemia major (BTM) is a genetic disorder that has been linked to an increased risk of contracting blood-borne viral infections, primarily due to the frequent blood transfusions required to manage the condition. One such virus that can be transmitted through blood is the Human Parvovirus B19 (B19V). The aim of this study was to investigate the frequency and molecular detection of B19V. This study included 60 blood donors as controls and 120 BTM patients. B19V was identified by serology, which measured B19-IgG and B19-IgM antibodies. Nested Polymerase Chain Reaction (nPCR) was employed to target the VP1/VP2 structural proteins. The results showed that B19V seropositivity represents 27.5% (33 out of 120) in BTM patients, and
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis study was aimed to use plant tissue culture technique to induce callus formation of Aloe vera on MS. Medium supplied with 10 mg/l NAA and 5 mg/l BA that exhibit the best results even with subculturing. As the method of [1] 1g. dru weight of callus induced from A. vera crown and in vivo crown were extracted then injected in HPLC using the standards of Ascorbic acid (vit. C), Salysilic acid and Nicotenic acid (vit. B5) to compare with the plant extracts. Results showed high potential of increasing some secondary products using the crown callus culture of A. vera as compared with in vivo crown, Ascorbic acid was 1.829 ?g/l in in vivo crown and increased to 3.905 ?g/l crown callus culture . Salysilic acid raised from 3.54 ?g/l in in vivo c
... Show More