The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wounds from various hospitals in Baghdad, including (Central Children's Hospital, Educational Laboratories, Ibn Al-Baladi Hospital).The isolates were confirmed to belong to the genus E.faecalis after performing morphological and biochemical microscopic examinations and for final diagnosis using the VITEC 2 system. The virulence genes viz. cylA, esp, gelE and agg were recognized in the E. faecalis, and the consequences appeared that the bacteria had eps gene in 32 isolates (100%). As for the agg gene, 32 isolates (100%) were carriers of this gene, which was responsible for these isolates' aptitude to form the biofilm. While for the gelE gene, 27 isolates (84.37%) of the isolates carried this gene, responsible for gelatinase activity whereas, the gene responsible for hemolysis cyl, there were 29 isolates (90.62%) of the total isolates. The presemce of genes in the isolates would be helpful to determine the colonization and survival of the bacterium in or causing damage to the host.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreImage pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreObjectives:
To evaluate mothers’ attitudes toward readiness for discharge care at home for a premature baby in Intensive Care Unit at teaching hospitals in Medical City Complex and to find out the relationship between mothers’ attitudes and their socio-demographic characteristics.
Methodology: A quasi-experimental study design was carried out through the period of 6th January 2020 to 2021 to 11th March 2021, to evaluate mother’s attitude toward discharge care plan for premature babies. The study carried out in Welfare Teaching Hospital, Nursing Home Hospital and Baghdad Teaching Hospital at Medical City Complex in Baghdad City on 30 mother of premature babies in neonatal intensive care units using the nonprobability sampling
Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreRisk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show MoreIn recent years, there is more interest in water sources availability, including groundwater due to an increase in demand for water because of the increasing population in the world, and the water recedes due to climate change also. Therefore, the study of groundwater has required more attention. The aim of the present study is to establish a MODFLOW model in the groundwater modeling system software to simulate the movement of groundwater in the Turssaq alluvial fan which is located in the Qazaniyah city, east of Diyala Governorate. The solid model was used to define the aquifer in the study area. Using the GIS software, mapping and preparing the data needed to create a conceptual model were carried out. The data of the
... Show MoreA composite section is made up of a concrete slab attached to a steel beam by means of shear connectors. Under positive and negative bending moment, part of the slab will act as a flange of the beam, resisting the longitudinal compression or tension force. When the spacing between girders becomes large, it is evident that the simple beam theory does not strictly apply because the longitudinal stress in the flange will vary with distance from the girder web, the flange being more highly stressed over the web than in the extremities. This phenomenon is termed "shear lag". In this paper, a nonlinear three-dimensional finite element analysis is employed to evaluate and determine the actual effective slab width of the composite steel-concrete
... Show More