n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and detection of (blaCTX-M-1, blaCTX-M-2, blaCTX-M-8 and blaCTX-M-9) was done by multiplex polymerase chain reaction (PCR). Results showed the presence of blaCTX-M-2 gene, which is responsible for resistance to cefotaxime in these isolates, while no other types of , blaCTX-M genes were found in them
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreتهدف هذه الدراسة إلى بحث ظاهرة الاغتراب في رواية " ديك الفداء " لايلي عامير ، لأن هذه الظاهرة تبدو أكثر وضوحا في هذه الرواية ، وتمثل تیارا مسيطرة على معطياتها واتجاهاتها الفكرية والفنية، خاصة أن الكاتب استطاع أن يجسد هذه الظاهرة المحورية تجسيدا فنيا متميزا ، وكشف عن طبيعة العلاقة بين عالم الواقع وعالم الحلم لدى الشخصيات، وعما تتسم به من تناقض و تعارض وتصادم و شعور بالإحباط والضياع والاغتراب. وقد اشتملت ال
... Show MoreHere, we found an estimation of best approximation of unbounded functions which satisfied weighted Lipschitz condition with respect to convex polynomial by means of weighted Totik-Ditzian modulus of continuity
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More