Background: Urinary tract infections (UTIs) and their complications such as Bladder cancer (Bl. C.) are a health growing problem worldwide. Objective: To shed light on this subject, present study was done to investigate relationship between recurrent urinary tract infection (RUTI) due to Escherichia coli (E. coli) and Bl. C.Type of study: Cross-sectional study. Methods: This study included 130 patients with RUTI, 50 patients with Bl. C. and 50 control of both sexes (aged 7-85 years) attending Al-Zahra Teaching Hospital in Al-Kut/Wassit governorate and Al-Harery Teaching Hospital of specialized surgeries/Baghdad. The patients were divided into two groups: the first group (n=130) included those who were suffering from recurrent UTI without bladder cancer and diagnosed clinically as having recurrent UTI. The second group(n=50) included those who had bladder cancer. One hundred and thirty morning midstream urine specimens were collected from recurrent urinary tract infection patients and 50 from healthy persons as a control and also 50 biopsy specimens collected from recurrent UTI with bladder cancer(after surgical operation to these patients) during beginning of October 2012 to end of March 2013. Results: Intracellular bacterial communities (ICBC) (namely Escherichia coli) was isolated from (68/130) 53% from patients with RUTI while (12/50) 24% isolated from patients with Bladder cancer In this study, other molecular technique called Repetitive extragenic palindromic (REP) were used for drawing the genetic map of bacteria to know the points of similarity and differences between isolated bacteria. A difference between bacteria in each group were found, but when comparing the genetic map of UPEC isolated from patients with Bl. C. with those isolated from patients with recurrent UTI high difference between them were seen. Conclusion: Detecting the intracellular bacterial communities (namely E. coli) in patients with recurrent UTI, with or without bladder cancer. Detecting similarity and difference in genetic map of UPEC isolated from RUTI and Bl. C. by Repetitive extragenic palindromic DNA (REP) technique, in which found high similarity between UPEC isolated from each group but difference from UPEC isolated from other group
Breast cancer is a disease in which cells in the breast grow out of control. CD200 is a cell surface glycoprotein expressed on many cells, it belongs to the immunoglobulin family (Ig) and have a great role in the regulation of inflammation in autoimmunity. CD200 is the ligand for CD200R1 receptor. To determine if serum level of CD200 and its receptor CD200R1 can be used as a diagnostic and prognostic marker in patients with breast cancer.This case control study was carried out at Oncology Teaching Hospital – Medical city in Baghdad. Six groups were enrolled, four groups were confirmed with breast cancer stage (I, II, III and IV), fifth group (benign) and sixth group was control (healthy individual). Serum is divided to me
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreLost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good