Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (ATCC4356). Minimum inhibitory concentration (MIC) of cell free supernatants of Lactobacillus acidophilus was determined by employing different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), to detect the concentration of probiotic that will inhibit E.coli (O157:H7) growth. Results: Results showed, 210 (84%) samples were identified as E.coli from 250 samples. The result showed (7) isolates were identified as Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 and showed all isolates of O157:H7 were positive for 16SrRNA gene with (213bp) and eae with (741bp), lifA with (712bp), only Stx1 gene appeared in all isolates with (446bp) and no bands with Stx2. Current result showed only cell free culture supernatant of Lactobacillus acidophilus has inhibitory activity against all E.coli (O157:H7) isolates with different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), while Lactobacillus fermentum, Lactobacillus plantarum have no effect against E.coli (O157:H7). The result showed the bacteriocin has inhibitory effect against E.coli (O157:H7), while organic acids and hydrogen peroxide haven’t any role in inhibition. The (MIC) value was (1/8) which inhibits the bacterial growth of isolates.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More
Faces of the individual in his life many stressful events, which includes expertise undesirable, and events may involve a lot of sources of tension and the risk factors and threats in all areas of life, and this would make the stressful events play a role in the genesis of many diseases physical.
The high blood pressure is one of the most Actual manifestations of mental stress in the present scale physical disorders which may frequently in men relative to women, which may be caused by spasms in the blood vessels.
To the Banks capital several uses, including the protection of deposits and this was approved by the Basel Committee, And Finance long-term investments which intended to investment in fixed assets that are essential to the continuation of banking activity, Fixed assets not financed from the funds of the deposit, but the owner equity do this jop. the current research tries to prove the effect of banks capital on fixed assets for a sample of iraqi private banks (bank of baghdad and Iraqi middle east Investment bank), for the period from 2011 until 2014. The research concluded that the capital of bank of baghdad affect on his total fixed assets by (84%), and the capital of Iraqi middle east Investment bank affect on his total fixed assets b
... Show MorePhase change materials are known to be good in use in latent heat thermal energy storage (LHTES) systems, but one of their drawbacks is the slow melting and solidification processes. So that, in this work, enhancing heat transfer of phase change material is studied experimentally for in charging and discharging processes by the addition of high thermal conductive material such as copper in the form of brushes, which were added in both PCM and air sides. The additions of brushes have been carried out with different void fractions (97%, 94% and 90%) and the effect of four different air velocities was tested. The results indicate that the minimum brush void fraction gave the maximum heat transfer in PCM and reduced the time
... Show MoreDifferent cooking conditions were examined for aluminum content in food cooked while wrapped with aluminum foil. The influence of each anticipated factor (the acidity of the cooking medium, type of acids normally used in cuisines namely acetic and tartaric acids, various cooking temperatures, influence of the presence of sodium chloride salt, the effect of cooking oil, and the length of time of cooking) was studied thoroughly as a function of aluminum degraded out of the aluminum foils to the medium. The experimental samples were digested with nitric acid upon fulfillment of examining each factor separately before quantifying aluminum with the sensitive technique of atomic absorption spectroscopy. The outcomes of the study have shown that t
... Show More