Abstract: In April 2009, a new variant of Influenza A virus
subtype H1N1 emerged in Mexico and spread all over the world. The
influenza has three subtypes in human (H1N1, H1N2 and H3N2)
Types B and C influenza tend to be associated with local or regional
epidemics. Preliminary genetic characterization of the influenza
viruses has identified them as swine influenza A (H1N1) viruses.
Nucleotide sequence analysis of the Haemagglutinin (HA) and
Neuraminidase (NA) are similar to each other and the majority of
their genes of swine influenza viruses, two genes coding for the
neuraminidase (NA) and matrix (M) proteins are similar to
corresponding genes of swine influenza. Sequence similarity between
the 2009 A (H1N1) virus and its nearest relatives indicates that its
gene segments have been circulating undetected for an extended
period. Nucleic acid sequence Maximum Likelihood (MCL) and
DNA Empirical base frequencies, Phylogenetic relationship amongst
the HA genes of H1N1 virus isolated in Genbank having high
nucleotide sequence homology.
In this paper we used 16 HA nucleotide sequences from NCBI for
computing sequence relationships similarity of swine influenza A
virus using the following method MCL the result is 28%, 36.64% for
Optimal tree with the sum of branch length, 35.62% for Interior
branch phylogeny Neighber – Join Tree, 1.85% for the overall
transition/transversion, and 8.28% for Overall mean distance.
Abstract: Dengue virus is transmitted from person to person
through the biting of infected Aedes Aegypti mosquitoes. DEN-1,
DEN-2, DEN-3 and DEN-4 are four serotypes of this virus. Infection
with one of these four serotypes apparently produces permanent
immunity to it, but only temporary cross immunity to the others. The
length of time during incubation of dengue virus in human and
mosquito are considered in this study. The dengue patients are
classified into infected and infectious classes. The infectious human
can transmit dengue virus to susceptible mosquitoes but infected
human can not. The transmission model of this disease is formulated.
The human population is divided into susceptible, infected, infectious
and recovered classes. The mosquito population is separated into
susceptible, infected and infectious classes. Only infectious
mosquitoes can transmit dengue virus to the susceptible human. We
analyze this model by using dynamical analysis method. The
threshold condition is discussed to reduce the outbreak of this
disease.
Abstract: The objective of current issue was to develop a model
of testicular herpes simplex virus (HSV) type I infection for
assessment of viral effect on fertility. 56 male mice were inoculated
intraperitoneally with different concentrations of HSV on 8 day post
partum. It was revealed that the optimal dose was 100 plaque
forming units per mice as it provided testicular infection in 100% of
survivors. HSV proteins were detected both in somatic and germ
cells (spermatogonia, spermatocytes, spermatides). Although DNA
load in testis was descending from 3 to 28 days post infection only
12.5% of infected males had offspring after mating with uninfected
females comparing to 87.5% in control (p=0.012). These results are
the first direct evidence for HSV impact in male sterility. Prepuberal
mice appeared to be a suitable model for investigation of
pathogenesis of virus-associated fertility disorders.
Abstract: Highly pathogenic avian influenza (HPAI) H5N1 viruses have created demand for a cost-effective vaccine to prevent a pandemic of the disease. Here, we report that Trichoplusia ni (T. ni) larvae can act as a cost-effective bioreactor to produce recombinant HA5 (rH5HA) proteins as an potential effective vaccine for chickens. To facilitate the recombinant virus identification, virus titer determination and access the infected larvae, we employed the internal ribosome entry site (IRES) derived from Perina nuda virus (PnV, belongs to insect picorna like Iflavirus genus) to construct a bi-cistronic baculovirus expression vector that can express the rH5HA protein and enhanced green fluorescent protein (EGFP) simultaneously. Western blot analysis revealed that the 70 kDa rH5HA protein and partially cleaved products (40 kDa H5HA1) were generated in T. ni larvae infected with recombinant baculovirus carrying the H5HA gene. These data suggest that the baculovirus-larvae recombinant protein expression system could be a cost-effective platform for H5N1 vaccine production.
Abstract: In this paper, a multi-agent robot system is presented. The system consists of four robots. The developed robots are able to automatically enter and patrol a harmful environment, such as the building infected with virus or the factory with leaking hazardous gas. Further, every robot is able to perform obstacle avoidance and search for the victims. Several operation modes are designed: remote control, obstacle avoidance, automatic searching, and so on.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: MMR vaccine failure had been reported globally and
here we report that it occurs now in India. Samples were collected from clinically suspected mumps cases were subjected for anti
mumps antibodies, virus isolation, RT-PCR, sequencing and
phylogenetic tree analysis. 56 samples collected from men and women belonging to various age groups. 30 had been vaccinated and
the status of 26 patients was unknown. 28 out of 30 samples were
found to be symptomatic and positive for Mumps IgM, indicating
active mumps infection in 93.4% of the vaccinated population. A
phylogenetic tree comparison of the clinical isolate is shown to be genotype C which is distinct from vaccine strain. Our study clearly sending warning signs that MMR vaccine is a failure and it needs to be revamped for the human use by increasing its efficacy and efficiency.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: It is shown that the relationship of tick-borne
encephalitis virus with the human body comes in two ways, the
development of acute infection with the outcome in convalescence
and long stay by the virus in the body, its persistence in the nervous
tissue with periodic reactivation and prolonged circulating
immunoglobulin M. In spite of the fact that tick-borne encephalitis
virus has a tropism for nerve tissue, involvement in the process of
blood cells is an integral component of the infection. Comprehensive
study of the relation of factors of innate and adaptive immunity in the
tick-borne encephalitis providing insight into the features of chronic
disease.
Abstract: A new strain of Type A influenza virus can cause the
transmission of H1N1 virus. This virus can spread between the
people by coughing and sneezing. Because the people are always
movement, so this virus can be easily spread. In this study, we
construct the dynamical network model of H1N1 virus by separating
the human into five groups; susceptible, exposed, infectious,
quarantine and recovered groups. The movement of people between
houses (local level) is considered. The behaviors of solutions to our
dynamical model are shown for the different parameters.
Abstract: The study was conducted to investigate the profile of
hepatitis in Kingdom of Saudi Arabia, and to determine which age
group hepatitis viruses most commonly infect. The epidemiology of
viral hepatitis in Saudi Arabia has undergone major changes,
concurrent with major socioeconomic developments over the last two
to three decades. This disease represents a major public health
problem in Saudi Arabia resulting in the need for considerable
healthcare resources. A retrospective cross sectional analysis of the
reported cases of viral hepatitis was conducted based on the reports
of The Ministry of Health in Saudi Arabia about Hepatitis A, B and C
infections in all regions from the period of January 2006 to December
2010. The study demonstrated that incidence of viral Hepatitis is
decreasing, except for Hepatitis B that showed minimal increase. Of
hepatitis A, B, and C, Hepatitis B virus (HBV) was the most
predominant type, accounting for (53%) of the cases, followed by
Hepatitis C virus (HCV) (30%) and HAV (17%). HAV infection
predominates in children (5–14 years) with 60% of viral hepatitis
cases, HBV in young adults (15–44 years) with 69% of viral hepatitis
cases, and HCV in older adults (>45 years) with 59% of viral
hepatitis cases. Despite significant changes in the prevalence of viral
hepatitis A, B and C, it remains a major public health problem in
Saudi Arabia; however, it showed a significant decline in the last two
decades that could be attributed to the vaccination programs and the
improved health facilities. Further researches are needed to identify
the risk factors making a specific age group or a specific region in
Saudi Arabia targeted for a specific type of hepatitis viruses.
Abstract: The common bean is the most important grain legume for direct human consumption in the world and BCMV is one of the world's most serious bean diseases that can reduce yield and quality of harvested product. To determine the best tolerance index to BCMV and recognize tolerant genotypes, 2 experiments were conducted in field conditions. Twenty five common bean genotypes were sown in 2 separate RCB design with 3 replications under contamination and non-contamination conditions. On the basis of the results of indices correlations GMP, MP and HARM were determined as the most suitable tolerance indices. The results of principle components analysis indicated 2 first components totally explained 98.52% of variations among data. The first and second components were named potential yield and stress susceptible respectively. Based on the results of BCMV tolerance indices assessment and biplot analysis WA8563-4, WA8563-2 and Cardinal were the genotypes that exhibited potential seed yield under contamination and noncontamination conditions.
Abstract: Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.
Abstract: Mathematical models can be used to describe the
transmission of disease. Dengue disease is the most significant
mosquito-borne viral disease of human. It now a leading cause of
childhood deaths and hospitalizations in many countries. Variations
in environmental conditions, especially seasonal climatic parameters,
effect to the transmission of dengue viruses the dengue viruses and
their principal mosquito vector, Aedes aegypti. A transmission model
for dengue disease is discussed in this paper. We assume that the
human and vector populations are constant. We showed that the local
stability is completely determined by the threshold parameter, 0 B . If
0 B is less than one, the disease free equilibrium state is stable. If
0 B is more than one, a unique endemic equilibrium state exists and
is stable. The numerical results are shown for the different values of
the transmission probability from vector to human populations.