Preferred Language
Articles
/
TRglepQBVTCNdQwCFhrp
Effectiveness of some β- lactamase encoding geneson biofilm formation and slime layer production byuropathogenic Escherichia coli
...Show More Authors

In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidime stress reduced the ability to produce slime layer and affected the viable bacterial countin combination with pH and temperature stresses. (PDF) Effectiveness of some β-lactamase encoding genes on biofilm formation and slime layer production by uropathogenic Escherichia coli. Available from: https://www.researchgate.net/publication/326088490_Effectiveness_of_some_b-lactamase_encoding_genes_on_biofilm_formation_and_slime_layer_production_by_uropathogenic_Escherichia_coli [accessed Jan 18 2025].

Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS: SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS
...Show More Authors

This research involved synthesis of new β-Lactam derivative from Azo compound[4-amino-N-(pyrimidine-2-yl)-3-(pyrimidine-2-yldiazenyl) benzene sulfonamide] (S1) record previously by many steps. Starting conversion the free amino group in an azo comp. to chloro acetamide derivative(S2), then reacted it with urea to give the oxazole ring  derivative (S3) that which containing free amino group. The condensation reaction between the amino group and P-bromobenzaldehyde to produce Shiff base (B14). Finally staudinger's cyclo addition reaction go run between the Shiff base derivative (B14) and chloro acetyl chloride in the presence of tri ethyl amine (Et3N) as Base catalyst and dioxane a

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 23 2023
Journal Name
Cumhuriyet Dental Journal
The effectiveness of continuous versus sequential chelation in the removal of smear layer and their influence on push-out bond strength of Bio-C sealer (An in vitro study)
...Show More Authors

Objectives: Successful endodontic treatment outcome requires effective shaping and cleaning of root canals. This study aims to evaluate the smear layer removal after continuous chelation (CC) ) NaOCL\HEDP( and sequential chelation (SC) )NaOCL\EDTA( and their influence on the push-out bond strength (POBS) of Bio-C sealer. Materials and Methods: Palatal roots of the maxillary first molar (n=72) were divided into four groups (n=18) as follows: 3% NaOCL, SC: 3% NaOCL followed by 17% EDTA, CC: 3% NaOCL \9% HEDP and Distilled water. Thirty-two roots (n=8/group) were split longitudinally for smear layer evaluation using SEM. Forty roots were obturated with Guttapercha and Bio-C sealer using a single cone technique. Thre

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Ecti Transactions On Computer And Information Technology
Diagnosis of COVID-19 Infection via Association Rules of Cough Encoding
...Show More Authors

Article information: COVID-19 has roused the scientic community, prompting calls for immediate solutions to avoid the infection or at least reduce the virus's spread. Despite the availability of several licensed vaccinations to boost human immunity against the disease, various mutated strains of the virus continue to emerge, posing a danger to the vaccine's ecacy against new mutations. As a result, the importance of the early detection of COVID-19 infection becomes evident. Cough is a prevalent symptom in all COVID-19 mutations. Unfortunately, coughing can be a symptom of various of diseases, including pneumonia and inuenza. Thus, identifying the coughing behavior might help clinicians diagnose the COVID-19 infection earlier and distinguish

... Show More
Preview PDF
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Applied Surface Science
Sol-gel derived ITO-based bi-layer and tri-layer thin film coatings for organic solar cells applications
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref