The present study is an attempt for detection of A. baumannii by conventional and PCR methods using species-specific primers for these A. baumannii. A total of 87 samples were collected from hospitals in Baghdad (Al-Rasafa and Al-Karkh Hospitals) during the period from 2019 to 2020.The samples included: 40 specimens, from wounds, respiratory infections (sputum), burns, CSF and 47 samples from the hospital environment (swabs), while samples collected from intensive care unit including patient beds, surgical instruments and appliances, emergency lobby and baby incubators. A. baumannii isolate identification depending on the morphologic characteristics on the culture media including, blood agar, MacConkey agar, as well as the biochemical tests including the manual biochemical tests that include catalase, oxidase and tests, and the automated biochemical tests such as API 20E,VITEK 2 system. The genomic DNA of A. baumannii isolates were extracted using wizard genomic DNA purification kit, the extracted genomic DNA was analyzed using 1% agarose gel electrophoresis, and then the concentration and purity of the extracted genomic DNA were determined using Nanodrop spectrophotometer device.To detect the A. baumannii isolates by molecular methods, the extracted genomic DNA of these isolates was submitted for amplification to detect the blaOXA-51 gene by the PCR method using species-specific primers for A. baumannii, out of 47 samples (35 ) showed positive results for A. baumannii by observing the PCR product of blaOXA-51 gene with ~353bp, in the agarose gel electrophoresis.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSocial marketing seeks to develop and integrate marketing concepts with other approaches to social change and aims to influence behaviors that benefit individuals and societies for the social good. The study investigates the type and level of influence of social marketing on customer behavior in tourism companies in Baghdad (Iraq). The sample size of the study is 135 people comprising directors, assistant directors, and marketing staff in tourism companies in Baghdad. A questionnaire was used as a tool to collect data and information, and was prepared by the researcher after it underwent validity, stability, and arbitration tests. The data was analyzed using the statistical program (SPSS v. 25, AMOS v. 23) and statistical methods have been
... Show More