Preferred Language
Articles
/
QxbJlYoBVTCNdQwCbKAg
Assessment the Effect of Lactobacillus Acidophilus on Escherichia Coli Serotype O157:H7 with Detection of Some Virulence Factors
...Show More Authors

Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (ATCC4356). Minimum inhibitory concentration (MIC) of cell free supernatants of Lactobacillus acidophilus was determined by employing different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), to detect the concentration of probiotic that will inhibit E.coli (O157:H7) growth. Results: Results showed, 210 (84%) samples were identified as E.coli from 250 samples. The result showed (7) isolates were identified as Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 and showed all isolates of O157:H7 were positive for 16SrRNA gene with (213bp) and eae with (741bp), lifA with (712bp), only Stx1 gene appeared in all isolates with (446bp) and no bands with Stx2. Current result showed only cell free culture supernatant of Lactobacillus acidophilus has inhibitory activity against all E.coli (O157:H7) isolates with different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), while Lactobacillus fermentum, Lactobacillus plantarum have no effect against E.coli (O157:H7). The result showed the bacteriocin has inhibitory effect against E.coli (O157:H7), while organic acids and hydrogen peroxide haven’t any role in inhibition. The (MIC) value was (1/8) which inhibits the bacterial growth of isolates.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Effect of PDEODE Strategy on the Acquisition of Historical Concepts of First Class of Intermediate Students
...Show More Authors

The research aims to find out the effect of PEDODE Strategy on the acquisition of historical concepts of First Intermediate Grade. To achieve this goal, the researcher has put forward this zero hypothesis: There is no statistically significant difference at the level of (05,0) between the mean of the students' marks in the experimental group who study the history subject using PEDODE strategy and that of the students' marks in the control group who study the subject according to the traditional method in the post-testing on the acquisition of historical concepts. The sample of the study consists of (62 female-students) of First Intermediate Grade in the Directorate of Baghdad Education/ Karkh2nd for the academic year 2016-2017. The sampl

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of SPAWN Strategy on the Life Skills among the Second Grade Intermediate Students
...Show More Authors

The aim of the research is to find out the effect of the SPAWN strategy on the life skills of second-intermediate-grade students. This study stage represented the research community within the intermediate and secondary governmental daytime schools affiliated with the Directorate of Education of Diwaniyah. The experiment was applied in Al-Razai Intermediate School on a sample of second-grade intermediate students, including 66 students distributed into two groups: (32) students within the experimental group and (34) students within the control group. The two groups were equivalent with a number of variables (chronological age, intelligence test, previous information test, life skills scale). The results indicated that the two groups were

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 11 2021
Journal Name
Neuroquantology
Measuring the Pollution Level with Uranium and Radon in the Soil of Some Areas Inside Baghdad University Campus-AL-Jadiriyah
...Show More Authors

In present study, the technique was used, including nuclear track detector type (CR-39), for appreciative concentrations uranium and radon in soil samples from Baghdad University Campus-AL-Jadiriyah utilizing a prolonged -term with a solid-state nuclear path sensor, a technique for charged particles has been developed., the radon concentrations, effective dose rate and uranium concentrations have measured in soil samples. Eight various venues from soil Baghdad University Campus have appointed. The results indicated variant values about uranium and radon concentrations, the average value for radon gas, effective dose rate and uranium concentrations was found to be 281.59 Bq/cm3, 7.09 mSv/y and 0.01 Bq/mm-2 respectively. All results a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Some Results on the Average Inverse Shadowing Property and Strong Ergodicity
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Aug 30 2024
Journal Name
Iraqi Journal Of Science
The Migration Effect on an Eco-toxicant Model
...Show More Authors

This paper proposes and studies an ecotoxicant system with Lotka-Volterra functional response for predation including prey protective region. The equilibrium points and the stability of this model have been investigated analytically both locally and globally. Finally, numerical simulations and graphical representations have been utilized to support our analytical findings

Scopus (2)
Scopus Crossref