Shendi, Sudan

University of Shendi
Shendi, Sudan

Shendi University is a public university that was established in 1994, located in Shendi, Sudan.It is a member of the Federation of the Universities of the Islamic World. Wikipedia.

Time filter
Source Type

Mirghani R.A.,King Saud bin Abdulaziz University for Health Sciences | Chowdhary G.,King Saud bin Abdulaziz University for Health Sciences | Elghazali G.,King Saud bin Abdulaziz University for Health Sciences | Elghazali G.,University of Shendi
Basic and Clinical Pharmacology and Toxicology | Year: 2011

Cytochrome P450 (CYP) 2C9 is responsible for the metabolism of a number of widely used drugs such as oral anticoagulants, oral antidiabetics and non-steroidal anti-inflammatory drugs. The CYP2C9 is a genetically polymorphic enzyme. The most common allele is CYP2C9*1, while CYP2C9*2 and CYP2C9*3 are the less-frequent variants. The activity of the enzyme encoded by either CYP2C9 *2 or *3 variant is lower compared with that of the CYP2C9*1. The metabolism of most of the CYP2C9 substrates decreases in varying degrees in subjects carrying the CYP2C9 *2 or *3 allele. The aim of this study was to investigate the frequencies of the major variants of the CYP2C9 in Saudi Arabians. © 2011 The Authors. Basic & Clinical Pharmacology & Toxicology © 2011 Nordic Pharmacological Society.

AbdElrouf W.,Sudan University of Science and Technology | Yousif A.,Sudan University of Science and Technology | Bashir M.B.,University of Shendi
International Journal of Grid and Distributed Computing | Year: 2016

Scheduling jobs on computational grids is identified as NP-hard problem due to the heterogeneity of resources; the resources belong to different administrative domains and apply different management policies. Genetic algorithm which is a metaheuristic search on the basis of the idea of the natural evolution of living organisms generate solutions in order to reach the best solution, using techniques inspired by nature, such as the selection, crossover and mutation. One of the most important processes in the genetic algorithm is the crossover process that combines two chromosomes (parents) to produce a new chromosome (offspring). The parents with the highest fitness functions are selected to participate in the process. The idea behind crossover is that the new chromosome will be better than both parents because it takes the best qualities of both of them. This paper proposed a new job scheduling mechanism based on increasing the crossover rate in genetic algorithm in order to reach the best solution faster to improve the functionality of the genetic algorithm. To evaluate the proposed mechanism this study conducted a simulation using GridSim simulator and different workloads. The results of the simulation process revealed that the increase in the exploitation process decrease the finish time. © 2016 SERSC.

Adam S.A.,University of Khartoum | Yousif A.,Sudan University of Science and Technology | Bashir M.B.,University of Shendi
International Journal of Grid and Distributed Computing | Year: 2016

Cloud Computing is a new technology that allows access to applications as utilities over the internet. Cloud computing environment provides a great flexibility and availability of computing resources at a lower cost. However, it brings new security concerns mainly when users understand exactly how a process is running. One of the main important challenges in cloud computing is data security, as users need to access data they share securely. So the main problem is how to employ an effective authentication procedure for ensuring data security and preventing unauthorized users to access the authorized user’s data. This paper identifies the security issues of single level authentication and the problem of single password. This study proposed a new security mechanism for cloud computing based on multilevel authentication. The proposed scheme aimed to enhance the security and authentication process in cloud computing. The proposed scheme consists of three level of authentication, and the data will be splitting on this level depending on the sensitivity to confidential (C), secret (S), and top secret (TS). Data at level (C) have the lowest sensitivity. The user at this level has single textual password to access this level data. The user at level (S) has two passwords, textual and biometrics password to access this level and the lower level. User at level (TS) has three password textual, biometrics password and image sequencing password. The data at this level is the more sensitive data so it is encrypted using RSA algorithm before storing in cloud database. The results of the proposed multilevel authentication for cloud computing were promising. © 2016 SERSC.

Shakak A.O.,University of Shendi | Khalil E.A.G.,University of Khartoum | Khalil E.A.G.,Central Laboratory | Musa A.M.,University of Khartoum | And 5 more authors.
BMC Public Health | Year: 2013

Background: Most people exposed to M. tuberculosis show no evidence of clinical disease. Five to 10% of individuals with latent infection progress to develop overt disease during their life time. Identification of people with latent TB infection will increase case detection rates and may dictate new treatment policies to control tuberculosis. This study aimed to determine LTBI point prevalence in a population from Sudan using two different diagnostic methods: the tuberculin skin test (TST) and the IFN-γ release assay (IGRA). Methods. This was a prospective, community-based and case-controlled study. Following informed consent, household contacts (HHCs; n = 98) of smear-positive index cases and Community controls (CCs; 186), were enrolled. Tuberculin skin test (TST), whole blood stimulation with ESAT-6/CFP-10 ± TB7.7 antigens or purified protein derivative (PPD) and IFN-γ levels determination with ELISA were performed. The levels of IFN-γ and TST induration between the CCs and the HHCs were compared using student t-test, Chi-square and Kappa coefficient. Pearson correlation test was used to compare TST and IFN-γ. P levels of <0.05 were considered significant. Results: TST induration of ≥ 10 mm gave an LTBI point prevalence of 327 cases/1000 individuals among HHCs compared to 126 cases/1000 individuals among CCs (p = 0.000). PPD-induced IFN-γ release assay gave an LTBI point prevalence of 418 cases/1000 individuals among HHCs compared to 301 cases/1000 individuals among CCs (p =0.06). On the other hand ESAT-6/CFP-10 ± TB7.7-induced IFN-γ gave an LTBI point prevalence of 429 cases/1000 individuals among HHCs compared to 268 cases/1000 individuals among CCs (p = 0.01). IFN-γ productions levels induced by ESAT-6/CPF-10 ± TB7.7 antigens in HHCS and CCs were not significantly different from those induced by PPD (p = 0.7). Conclusion: IFN-γ release assay (IGRA) gave higher LTBI point prevalence compared to TST in HHCs and CCs. PPD gave comparable results to ESAT-6/CFP-10 ± TB7.7 antigens in whole blood IFN-γ release, making it a cheap alternative to the recombinant antigens. © 2013 Shakak et al.; licensee BioMed Central Ltd.

Farouk M.,Sudan University of Science and Technology | Yousif A.,Sudan University of Science and Technology | Bashir M.B.,University of Shendi
2015 International Conference on Cloud Computing, ICCC 2015 | Year: 2015

Cloud computing systems assist applications by offering virtualized resources that can be provisioned on demand basis. Computing resources are delivered by Virtual Machines (VMs). Traditional development models have many limitations such as cost and delay. Platform as services is an effective solution for most of problems on traditional development application model that faced by programmers as Platform as a Service provides them the same traditional features with a faster speed, reducing the cost and increasing collaboration. The aim of this paper is to develop cloud based framework based on Platform as a Services to assist in developing, testing and deploying application without the need to purchase of hardware, operating systems, and tools that is obtainable as services via the Internet. To evaluate the proposed framework, this study conducted an empirical study by setting up an experiment for programmers and IT 'specialists. The achieved results revealed that the proposed framework can overcome the tradition framework limitation © 2015 IEEE.

Bashir M.B.,University of Shendi | Latiff M.S.A.,University of Technology Malaysia | Yousif A.,Sudan University of Science and Technology
2015 International Conference on Cloud Computing, ICCC 2015 | Year: 2015

Grid-based Massive dataset search systems integrate many processes to search for a large number of shared datasets distributed over several locations. The implementation of the search mechanism to deal with these distributed dataset greatly affected the system performance. However, the execution of the search over the grid requires someone with grid knowledge and expertise. Consequently, this issue leads this research to propose an interface that hides the complexities of the grid operations from the end users. Additionally, the interface provides single sign-on mechanism to allow users to access several Virtual Organizations (VO) with a single user name and a password. The experiment was conducted to evaluate the user interface overhead and the efficiency of the interface. The result shows that the client user interface produces less overhead and is reasonably efficient in dealing with several VOs. © 2015 IEEE.

Bashir M.,University of Technology Malaysia | Bashir M.,University of Shendi | Abd Latiff M.,University of Technology Malaysia | Ahmed A.,University of Technology Malaysia | And 2 more authors.
IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India) | Year: 2013

Distributed information retrieval methods are growing rapidly because of the rising need to access and search distributed digital documents. However, the content-based information retrieval (CBIR) is concentrated to extract and retrieve the information from massive digital libraries, which require a huge amount of computing and storage resources. The grid computing provides the reliable infrastructure for effective and efficient retrieval on these large collections. In order to build an effective and efficient CBIR technique, varieties of architectures were developed based on grid technologies. The goal of such architecture is to solve interoperability and heterogeneous resource issues, and increase the efficiency and effectiveness of information retrieval (IR) techniques by harnessing the grid computing capabilities. This paper reviews and analyzes latest research carried out in the domain of large-scale dataset IR based on a grid. The evaluation is based on scalability, response time, scope, data type, search technique, middleware, and query type. The contribution is to illustrate the features, capabilities, and shortages of current solutions that can guide the researchers in this evolving area.

Sulieman Y.,University of Shendi | Pengsakul T.,Prince of Songkla University | Afifi A.,Sudan University of Science and Technology
Herpetological Conservation and Biology | Year: 2016

We analyzed the dietary composition of 153 specimens of the subdesert toad, Amietophrynus xeros, collected in the rainy and dry seasons in Shendi, Sudan. The dietary items in the toads included a wide variety of arthropod prey belonging to 10 orders: Hymenoptera, Coleoptera, Heteroptera, Diptera, Isoptera, Lepidoptera, Orthoptera, Acari, Araneae, and Lithobiomorpha. The most frequent prey items were insects of the order Hymenoptera and Coleoptera, during both the rainy and dry seasons. We found significant positive correlations between the snout-vent length of the toads and both the number and length of prey consumed, based on analyses of all toads and several prey orders. We did not find significant differences between male and female toads in the mean number or mean length of prey consumed during either the rainy or dry seasons. Likewise, we did not find significant differences between juveniles and adults in the mean number or mean length of prey consumed during the two seasons, even though adults averaged approximately twice as long as juveniles. © 2016. Yassir Sulieman. All Rights Reserved.

Al-Muslet N.A.,Sudan University of Science and Technology | Ali E.E.,University of Shendi
Journal of Applied Spectroscopy | Year: 2012

Bladder cancer is one of the most common cancers in Africa. It takes several days to reach a diagnosis using histological examinations of specimens obtained by endoscope, which increases the medical expense. Recently, spectroscopic analysis of bladder cancer tissues has received considerable attention as a diagnosis technique due to its sensitivity to biochemical variations in the samples. This study investigated the use of Fourier transform infrared (FTIR) spectroscopy to analyze a number of bladder cancer tissues. Twenty-two samples were collected from 11 patients diagnosed with bladder cancer from different hospitals without any pretreatment. From each patient two samples were collected, one normal and another cancerous. FTIR spectrometer was used to differentiate between normal and cancerous bladder tissues via changes in spectra of these samples. The investigations detected obvious changes in the bands of proteins (1650, 1550 cm -1), lipids (2925, 2850 cm -1), and nucleic acid (1080, 1236 cm -1). The results show that FTIR spectroscopy is promising as a rapid, accurate, nondestructive, and easy to use alternative method for identification and diagnosis of bladder cancer tissues. © 2012 Springer Science+Business Media, Inc.

PubMed | University of Shendi, Sudan University of Science and Technology, University of Khartoum and Prince of Songkla University
Type: Journal Article | Journal: Iranian journal of parasitology | Year: 2016

Schistosomiasis is one of the major communicable diseases of public health and socioeconomic importance in developing countries. This study assessed the situation of schistosomiasis among villagers of the New Halfa Agricultural Scheme, Sudan.An epidemiological survey was carried out in three randomly selected residential sites: Village 19, Village 26 and Talat shagrat Camp, from October to December 2013. Feces and urine samples were collected from 2433 individual (1195 male and 1238 female) and examined for schistosomiasis infection. The prevalence and intensity of infection were calculated according to study sites and participants sex and age-group.There was no infection with Schistosoma haematobium among the examined individuals, while the overall prevalence of S. mansoni infection was 27.4% and the mean intensity among those infected was 261.1 eggs per gram (epg). A high prevalence and intensity of infection was found among the residents of Talat shagrat Camp, followed by the other two villages. The prevalence of infection among males was 41.4%, and among females was 13.9%. On the other hand, the intensity of infection among females was 293.4 epg and among males 187.6 epg. A high prevalence of infection was found in the age-groups 11-20 years and > 50 years. High intensity of infection was present in the age-groups 31-40 years and > 50 years.The finding of the study shows the need for an integrated control program against schistosomiasis. Mass treatment, provision of adequate clean-water supply and combating the intermediate snail host are suggested.

Loading University of Shendi collaborators
Loading University of Shendi collaborators