Preferred Language
Articles
/
jkmc-788
Detection of Parvovirus B19 DNA in pregnant Sudanese women attending The Military hospital using Nested PCR technique : Detection of Parvovirus B19 DNA in pregnant Sudanese women
...Show More Authors

Background: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.  

Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.

Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B19 DNA using nested PCR technique.

Result: Two samples were found positive for Parvovirus B19 DNA out of the total number of samples screened.

Conclusions: The prevalence of Parvovirus B19 DNA among pregnant women attending the Military hospital was 2.1%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Veterinary Sciences
Isolation and molecular detection of enterotoxigenic Staphylococcus aureus from raw milk of cows
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 18 2025
Journal Name
Discover Food
Analysis of the effectiveness of natural treatments for preserving apricots and the YOLOv7 application for early damage detection
...Show More Authors

Maintaining the quality of apricot fruits during storage is not an easy task due to the changes in their physical and chemical properties, so it is necessary to use less expensive, easy to apply, environmentally friendly, and safer preservatives to maintain the nutritional value of apricot. The damage to some fruits during storage can be a source of infection, which leads to the damage of healthy fruits more quickly, which requires building an intelligent model to detect damaged fruits. The aim of the research is to study the effect of immersing apricots in lemon juice once and sugar-water solution again on the quality properties of apricots, including sweetness, color, hardness, and water content. On the other hand, the YOLOv7 algorithm wa

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
E3s Web Of Conferences
The impact of military waste on Iraq’s waters: The case of the Jassim River
...Show More Authors

This article aims to investigate how war contributes to the pollution of water bodies with harmful substances including heavy metals and toxic substances. The paper explains how these pollutants, carelessly dumped by military operations, have severely damaged the water quality of rivers and lakes all across Iraq. Based on the Jassim River as case study, the paper shows a close relationship between military operations and pollution. Shown is the effects of this pollution on local ecosystems like fish and wildlife, and human population, dependent on the river for drinking, irrigation, and other basic needs. The article reveals the problem of military waste in Iraq, focusing on the absence of satisfactory waste disposal techniques and

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Technique Features of the 1990s Prose Poem in Iraq: The Technique Features of the 1990s Prose Poem in Iraq
...Show More Authors

Abstract:
The prose poem of the 1990s is considered one of the important
contributions of the Iraqi poetic scene. The poem found a position in the Iraqi
poetry because of the favor of a group of youth poets who lefty clear traces.
Their linguistic techniques often violate the domain o9f language, significance
and image.
The poems of those youth poets moved the verse towards reality to
drink from its abundant springs in order to stand on a rigid ground. Their
linguistic traces are characterized by paradox and astonishment that are used
by the poet to construct his poem.

The paradox was considered an ideal means for constructing a
poem by some of them. The poem moved towards definitions and these
de

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Journal Of Communicable Diseases
The Relation between RT-PCR and Chest CT Scan Sensitivity as Tools in the Diagnosis of COVID-19 Patients in Al-Najaf Province, Iraq
...Show More Authors

The typical test for diagnosis of severe acute respiratory syndrome coronavirus 2 is a reverse transcription-polymerase chain reaction (RT-PCR) technique, but the chest CT scan might play a complementary role at the first detection of Coronavirus Disease 2019 (COVID-19) pneumonia. Objectives: To determine the sensitivity of CT scan on patients with COVID-19 in Al-Najaf, Iraq, and to compare the accuracy of CT scan with that of RT-PCR technique. Material and Method: This is a prospective study. The patients suspicious of having COVID-19 infection and respiratory symptoms were registered. All patients were diagnosed by RT-PCR and chest CT. Diagnostic performance of CT was intended using RT-PCR as the reference sta

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum: Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum
...Show More Authors

Abstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing

... Show More
View Publication
Crossref
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 03 2023
Journal Name
International Journal Of Advances In Science, Engineering And Technology
VISUAL INTERACTION TECHNOLOGY IN THE PEDIATRIC MEDICALDEPARTMENTS OF THE EDUCATIOAL HOSPITAL.
...Show More Authors