Aim: To evaluation the effect of Lactobacillus acidophilus on Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 with detection of some virulence factors. Methods: Two hundred and fifty specimens (stool) from children under five years for both sexes were collected from some hospitals. All isolates were diagnosed according to morphological characteristics, biochemical tests. Monoplex pattern of PCR was used also for detection different genes in (7) Escherichia coli )O157:H7 (isolates; include 16SrRNA, eae, lifA, Stx1,Stx2 that encoded for ribosomal RNA, intimin, lymphocyte inhibitory factor, shiga toxins. Three types of probiotics strains were obtained, Lactobacillus fermentum, Lactobacillus plantarum and Lactobacillus acidophilus (ATCC4356). Minimum inhibitory concentration (MIC) of cell free supernatants of Lactobacillus acidophilus was determined by employing different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), to detect the concentration of probiotic that will inhibit E.coli (O157:H7) growth. Results: Results showed, 210 (84%) samples were identified as E.coli from 250 samples. The result showed (7) isolates were identified as Enterohemorrhagic Escherichia coli (EHEC) serotype O157:H7 and showed all isolates of O157:H7 were positive for 16SrRNA gene with (213bp) and eae with (741bp), lifA with (712bp), only Stx1 gene appeared in all isolates with (446bp) and no bands with Stx2. Current result showed only cell free culture supernatant of Lactobacillus acidophilus has inhibitory activity against all E.coli (O157:H7) isolates with different dilutions (1/2, 1/4, 1/8, 1/16, 1/32), while Lactobacillus fermentum, Lactobacillus plantarum have no effect against E.coli (O157:H7). The result showed the bacteriocin has inhibitory effect against E.coli (O157:H7), while organic acids and hydrogen peroxide haven’t any role in inhibition. The (MIC) value was (1/8) which inhibits the bacterial growth of isolates.
This study was conducted in the poultry field of Al-Mustansiriya University/ Baghdad, to show the effect of adding different levels 0, 1, 5 and 10% of the fenugreek seeds in the rations containing many contaminated microbes on the productive performance of broilers. 150-day-old rose meat was used with a 41 average weight (gm), were randomly allocated to 4 treatments with 3 replicates, and for each treatment 15 chicks per repetition: 0, 1, 5, and 10% (T0-T3), respectively. The results of this study showed that fenugreek seeds contain good amounts of protein, fat, ash and carbohydrates, which are 24.92, 8.82, 3.08 and 54.28 respectively. Fenugreek seeds also have high levels of tannins, coumarins and flavones, followed by saponins,
... Show MoreIn this paper the specific activity of 238U, 232Th and 40K
radionuclides were determined by sodium iodide enhanced by
thallium NaI(Tl) detector and assessment the annual effective dose
in samples of powder milk from different companies such as
Almunaish, Seven Caw, Molty and Altunsa for adult available in
Baghdad markets. The specific activity of 40K has the greater value in
all the samples which is in the range of allowed levels globally that
suggested by UNSCEAR. The mean value of annual effective doses
were 0.121, 0.314775 and 0.305 mSv/y for 238U, 232Th and 40K
respectively.
Background: One of the most predominant periodontal diseases is the plaque induced gingivitis. For the past 20 years, super-oxidized solutions have be..
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.