Klebsiella pneumoniae is an adaptable pathogen that forms biofilms on a variety of surfaces. This study's objective was to identify the presence of fimbrial genes (types 1 and 3) in K. pneumoniae strains isolated from various clinical sources based on their antibiotic resistance and ability to form biofilms. According to identification utilizing the vitek 2 technology and confirmation by molecular identification targeting the 16S rRNA gene with a particular primer, forty isolates were identified from clinical specimens. The vitek 2 compact system was utilized to evaluate the antibiotic susceptibility of all the isolates. The findings revealed a range of resistance percentages, including 52.5% for Penicillin, 40.5% for Trimethoprim/Sulfamethoxazole, 34.5% for Cephalosporins, 6.25 % for Fluoroquinolones, and 2.5% for each of Carbapenem, Aminoglycoside, Tetracycline, and Nitrofurantoin. The 96-well microtiter plate technique was utilized to generate biofilms. The results demonstrated that all 40 Klebsiella pneumoniae isolates (100%) produced potent biofilms. In order to identify the genes involved in biofilm formation (fimh & mrkd) and the genes responsible for adhesin in type 1& type 3 fimbriae using traditional PCR method, eleven isolates were chosen for molecular analysis that are powerful biofilm makers and MDR.
Gas and downhole water sink assisted gravity drainage (GDWS-AGD) is a promising gas-based enhanced oil recovery (EOR) process applicable for reservoirs associated with infinite aquifers. However, it can be costly to implement because it typically involves the drilling of multiple vertical gas-injection wells. The drilling and well-completion costs can be substantially reduced by using additional completions for gas injection in the oil production wells through the annulus positioned at the top of the reservoir. Multi-completion-GDWS-AGD (MC-GDWS-AGD) can be configured to include separate completions for gas injection, oil, and water production in individual wells. This study simulates
Apple vinegar has many uses that include burn and wound healing and as an antimicrobial agent against different microorganisms, but not as a solvent. Therefore, this study aimed to use commercial apple vinegar as solvent to the plants of roselle (Hibiscus sabdariffa), green tea (Camellia sinensis), and clove (Syzygium aromaticum). The effects of apple-vinegar extracts of these plants were compared with those of aqueous and ethanolic extracts against biofilm formation by Candida genus. Clove vinegar extract demonstrated antibiofilm activity against C. albicans, alone (2.4907± 0.382) or in combination with the antifungal agents fluconazole (1.689±0.33), nystati
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreThe importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreSeveral Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show More