Preferred Language
Articles
/
fRer140BVTCNdQwCpCag
Serological and Molecular Phylogenetic Detection of Coxiella burnetii in Lactating Cows, Iraq
...Show More Authors

This study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnetii IQ-No.6; and then recorded in the National Center for Biotechnology Information (NCBI) under an accession numbers of MN473204.1 and MN473205.1. Comparative identity of the local strains with NCBI-BLAST strains/isolates revealed 97% similarity and 0.1-0.6% of total genetic mutations/changes. NCBI-BLAST Homology Sequence reported high significant identity (P<0.05) between the local, C. burnetii IQ-No.5 and C. burnetii IQ-No.6; strains and C. burnetii 3345937 (CP014354.1) Netherlands isolate at 99.10% and 99.06%, respectively. The current study concluded that the percentage of infected cows with coxiellosis is relatively high, and Coxiella should be listed as abortive pathogen. Therefore, additional studies should be performed including different animals, samples, and regions.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Constants of blood money in the Koran   And its variables in the custom prevailing in Iraq
...Show More Authors

Praise be to Allah, the Lord of the Worlds.
          Because it has a prominent role in the life of the Muslim person in particular, and in the stability, security, and safety of society in general, I found it appropriate to participate even a little in solving some of the problems that arise in the nation, and that Adello Badawi in this important issue that concerns everyone without exception And that I show that there are constants in the Koran, from which the scholars of the Ummah derived their evidence on this subject, and that there have been variables have occurred in some Islamic societies, in the issue of blood money that deserves the victim and his family, has allocated talk

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
Comorbidity and Risk Factors for COVID-19 Confirmed Patients in Wasit Province, IRAQ
...Show More Authors

Background: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Disc damage likelihood scale recognition for Glaucoma detection
...Show More Authors
Abstract<p>Glaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d</p> ... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Innovative Systems Design And Engineering
Automated Surface Defect Detection using Area Scan Camera
...Show More Authors

Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Wearable Detection Systems for Epileptic Seizure: A review
...Show More Authors

The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.

Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.

The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple

... Show More
View Publication Preview PDF
Crossref