In order to investigate the presence of methicillin or multidrug resistant Staphylococcus aureus in food-chain especially Cows raw milk and white raw soft cheese and its whey, a total of 30 samples were collected randomly from different markets in Baghdad Province during December 2012 till February 2013, in which samples were analyzed by a standard isolation protocols of food microbiology with some modification processing by new, modern and rapid technology tools such as chromogenic medium Baird-Parker agar, Electronic RapIDTM Staph Plus Code Compendium Panel System (ERIC®) Dryspot Staphytect Plus and Penicillin Binding Protein (PBP2') Plus assays; as well as, studying the susceptibility of isolates to different selected antibiotics. The results profile showed isolation, identification, confirmation and enumeration of 10 (33.4%) isolates of MRSA as 4 (13.4%) isolates from raw milk and 6 (20%) isolates from white raw soft cheese with its whey. These findings suggest presence of MRSA type in locally produced raw milk and soft cheeses in Baghdad markets thus recommended to monitoring these products periodically to inshore public health.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe research depth and dimensions of the problem of environmental pollution resulting from the combustion of fuel used in electric power generators, especially in the summer and you are the national electric power supplied by almost non-existent state where this problem is a local phenomenon that has serious dimensions to human health, as well as the possibility of using a the tax system tools of b (environmental taxes) to reduce these pollutants, so the search is aimed at the types of gases emitted from burning fuel electric generators operating in the province of Baghdad and then measure the amount of environmental pollution as well as compared to the amount of some of these gases, which is more risk to humans with permitted by the Wor
... Show MoreObjective(s): The present study aims at assessing the prevalence of smoking among health workers in Baghdad Teaching Hospital and to find out the effectiveness of instructional booklet concerning risk of smoking on health workers′ knowledge in hospital.
Methodology: A pre-experimental design study was conducted from 1st of October 2019 to 17th of March 2020. A non-probability sample consists of (500) participant (343 non-smokers and 157 smokers) from (1500) health workers in Baghdad Teaching Hospital, they included the physicians, nurses, pharmacists, physiotherapists, Laboratory Technicians, Medical Assistants. A questionnaire is constructed to evaluate the effectiveness of instructional booklet on health workers’ knowledge