Background: Early detection of subclinical left ventricular (LV) systolic dysfunction is crucial and could influence patients' prognosis by aiding the clinician to candidate patients for better management.
Objective: To detect early LV systolic dysfunction in asymptomatic patient with chronic aortic regurgitation by two dimensional speckle tracking echocardiography.
Methods: Sixty one asymptomatic patients with chronic aortic regurgitation, with no ischemic heart diseases (by coronary angiography) or conductive heart diseases, no diabetes mellitus, no hypertension, and no other valvular heart diseases (group 1) and fifty age and sex-matched healthy subjects (
... Show MoreThe present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhizal colonization in al
... Show MoreIn this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreOut of a total of fifty samples, thirty-five isolates were identified as Serratia marcescens. Thesediverse clinical samples were collected over a three-month period, from October 2023 to December 2023, fromseveral hospitals in Baghdad, including Fatima Al-Zahraa Hospital, Al-Sader Hospital, Ibn Al-Balady Hospital,and Al-Imam Ali Hospital. The clinical samples primarily included urine from patients with urinary tractinfections (UTIs). All isolates were cultured on nutrient agar, MacConkey agar, and blood agar, and theiridentities were confirmed through biochemical testing and the Vitek 2 compact system. Based on phenotypicvirulence factors, the S. marcescens isolates showed varying positive patterns: 32 out of 35 (91.42%) forprotease
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show More