Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (ATCC4356). Minimum inhibitory concentration (MIC) of cell free supernatants of Lactobacillus acidophilus was determined by employing different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), to detect the concentration of probiotic that will inhibit E.coli (O157:H7) growth. Results: Results showed, 210 (84%) samples were identified as E.coli from 250 samples. The result showed (7) isolates were identified as Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 and showed all isolates of O157:H7 were positive for 16SrRNA gene with (213bp) and eae with (741bp), lifA with (712bp), only Stx1 gene appeared in all isolates with (446bp) and no bands with Stx2. Current result showed only cell free culture supernatant of Lactobacillus acidophilus has inhibitory activity against all E.coli (O157:H7) isolates with different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), while Lactobacillus fermentum, Lactobacillus plantarum have no effect against E.coli (O157:H7). The result showed the bacteriocin has inhibitory effect against E.coli (O157:H7), while organic acids and hydrogen peroxide haven’t any role in inhibition. The (MIC) value was (1/8) which inhibits the bacterial growth of isolates.
The professional skepticism is one of the fundamental concepts necessary for practicing the audit profession, without which the auditor can not reach a reasonable assurance as to the correctness of the evidence and the information obtained by the auditing department. The auditor's possession of the characteristics of professional skepticism and his practice of professional skepticism during the audit process lead to an increase The quality of audit and thus raise the confidence of the financial community in the audit profession again after the exposure of several crises led to the loss of financial society confidence in the audit profession.
The aim of the study is to measure the impact of professional sk
... Show MoreThe present studies are focused on the modification of the properties of epoxy resin with different additives namely aluminum, copper by preparing of composites systems with percentage (20%, 40% and 50%) of the above additives. The experimental results show that the D.C of conductivity on wt% filler content at ( 293-413 ) K electrical conductivity of all above composites increased with temperature for composites with filler contact and find the excellent electrical conductivity of copper and lie between (2.6*10-10 - 2.1*10-10)?.cm . The activation energy of the electrical conductivity is determined and found to decrease with increasing the filler concentration.
The aim of study is to identify the histological changes in ovaries of the albino mice exposed to silver nanoparticles. Sixty adult females were collected and exposures by 4000 p.p.m. and 50-150 nm in size, Females were divided into 3treated groups. The concentration dosage was (1, 1.5 and 2) p.p.m. of silver nanoparticles for 7, 14 and 21 days as exposure periods as well as control group which treated by normal saline. Treated groups appeared different histopathological changes, it is depending on the concentration of silver nanoparticles and the period of exposure. These changes were included congestion in the blood vessels, hemorrhage, hyaline degeneration, fatty degeneration, pyknosis, necrosis as well as fusion of cells in follicula
... Show MorePortland cement is considered the most involved product in environmental pollution. It is responsible for about 10% of global CO2 emissions [1]. Limestone dust is a by-product of limestone plants and it is produced in thousands of tons annually as waste material. To fulfill sustainability requirements, concrete production is recommended to reduce Portland cement usage with the use of alternative or waste materials. The production of sustainable high strength concrete by using nanomaterials is one of the aims of this study. Limestone dust in 12, 16, and 20% by weight of cement replaced cement in this study. The study was divided into two parts: the first was devoted to the investigation of the best percentage of replacement of waste
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More