In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidime stress reduced the ability to produce slime layer and affected the viable bacterial countin combination with pH and temperature stresses. (PDF) Effectiveness of some β-lactamase encoding genes on biofilm formation and slime layer production by uropathogenic Escherichia coli. Available from: https://www.researchgate.net/publication/326088490_Effectiveness_of_some_b-lactamase_encoding_genes_on_biofilm_formation_and_slime_layer_production_by_uropathogenic_Escherichia_coli [accessed Jan 18 2025].
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBacterial strains were isolated from oil-contaminated soil, in 2018, these isolates were identified, and with the aim of finding out the ability of these isolates to degrede the oil compounds, the color change of medium which added to it isolates was read by the method of Pacto Bushnell Hans. Then the change in the petroleum compounds was read by gas chromatography, for the most effective isolates.
The nine isolated bacterial showed different degrees of color change, and the isolates (Pseudomonas, Bacillus, Micrococcus) outperformed the color change amount (78, 78, 77) %, respectively, compared to the control, and the three isolates together showed the best color change of 90.7. % Compared to the control, and the
... Show MoreAims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level
Ethanol production were evaluated by many strains with varing
degree of flocculation in fermentation medium of date extract withl 0
Brix, PHS in 30C0آ آ for آ 48hr.lt was found that ethanol production decrease with increase of flocculation degree and non-flocculant strain is آ more efficient in آ producing ethanol from flocculant strain,then
ethanol sensitivity were examined for the same strains, in liquid medium YE, it was found thatآ آ strain is more sensitive from nonآ flocculant and ethanol sensitivity depends upon flocculation degree.
The sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by
Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.