Preferred Language
Articles
/
TRglepQBVTCNdQwCFhrp
Effectiveness of some β- lactamase encoding geneson biofilm formation and slime layer production byuropathogenic Escherichia coli
...Show More Authors

In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidime stress reduced the ability to produce slime layer and affected the viable bacterial countin combination with pH and temperature stresses. (PDF) Effectiveness of some β-lactamase encoding genes on biofilm formation and slime layer production by uropathogenic Escherichia coli. Available from: https://www.researchgate.net/publication/326088490_Effectiveness_of_some_b-lactamase_encoding_genes_on_biofilm_formation_and_slime_layer_production_by_uropathogenic_Escherichia_coli [accessed Jan 18 2025].

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Isolation and identification of some bacterial isolates from soil contaminated with crude oil and Testing Their Effectiveness
...Show More Authors

Bacterial strains were isolated from oil-contaminated soil, in 2018, these isolates were identified, and with the aim of finding out the ability of these isolates to degrede the oil compounds, the color change of medium which added to it isolates was read by the method of Pacto Bushnell Hans. Then the change in the petroleum compounds was read by gas chromatography, for the most effective isolates.

The nine isolated bacterial showed different degrees of color change, and the isolates (Pseudomonas, Bacillus, Micrococcus) outperformed the color change amount (78, 78, 77) %, respectively, compared to the control, and the three isolates together showed the best color change of 90.7. % Compared to the control, and the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Encoding errors in reading the first grade of primary (analytical study)
...Show More Authors

    Aims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level

View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Flocculation on The ethanolic Production in Some Various Yeast
...Show More Authors

Ethanol production were evaluated by many strains with varing

degree of flocculation in fermentation medium of date extract withl 0

Brix, PHS in 30C0Ø¢  Ø¢ for Ø¢ 48hr.lt was found that ethanol production decrease with increase of flocculation degree and non-flocculant strain is Ø¢ more efficient in Ø¢ producing ethanol from flocculant strain,then

ethanol sensitivity were examined for the same strains, in liquid medium YE, it was found thatØ¢  Ø¢ strain is more sensitive from nonآ­ flocculant and ethanol sensitivity depends upon flocculation degree.

 

View Publication Preview PDF
Publication Date
Tue Oct 22 2024
Journal Name
Hemoglobin
Prevalence and Molecular Characterization of β-Thalassemia in Kirkuk Province of Northern Iraq
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Egyptian Journal Of Biological Pest Control
Evaluation of the effectiveness of some mycorrhizal fungi isolates against charcoal rot disease
...Show More Authors
Abstract<sec> <title>Background

The sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by Macrophomina phaseolina. This disease has serious damages to sunflower crop. This study aimed to assess the efficacy of Arbuscular mycorrhizal fungus against charcoal rot disease as fungicide alternative.

Results

Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Effect of Good Hygiene Practices on E. coli O157:H7 Contamination in Some Al-‎Karkh Area Restaurants, Baghdad, Iraq
...Show More Authors

View Publication
Crossref