Preferred Language
Articles
/
TRglepQBVTCNdQwCFhrp
Effectiveness of some β- lactamase encoding geneson biofilm formation and slime layer production byuropathogenic Escherichia coli
...Show More Authors

In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidime stress reduced the ability to produce slime layer and affected the viable bacterial countin combination with pH and temperature stresses. (PDF) Effectiveness of some β-lactamase encoding genes on biofilm formation and slime layer production by uropathogenic Escherichia coli. Available from: https://www.researchgate.net/publication/326088490_Effectiveness_of_some_b-lactamase_encoding_genes_on_biofilm_formation_and_slime_layer_production_by_uropathogenic_Escherichia_coli [accessed Jan 18 2025].

Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Synthesis of a Series of α, β-Unsaturated Ketoximes and their Corresponding Acetate Esters
...Show More Authors

      A series of 1,3-diarylprop-2-en-1-one oximes (7-12) were synthesized via reaction of 1,3-diarylprop-2-en-1-one (1-6) with NH2OH. HCl in dry pyridine. In order to produce the required products (13-18) as anti-isomers, these products (7–12) were then treated with acetic anhydride in dry pyridine. Different substitutes are maintained, resulting in the separation of different products in different yields The recently produced esters are thought to be useful as building blocks for the synthesis of substituted pyridines and many other nitrogen-holding complexes, which are elaborate structures in medicinal chemistry and present in a variety of pharmaceutical medications. The synthesized products were characteriz

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Egyptian Journal Of Biological Pest Control
Evaluation of the effectiveness of some mycorrhizal fungi isolates against charcoal rot disease
...Show More Authors
Abstract<sec> <title>Background

The sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by Macrophomina phaseolina. This disease has serious damages to sunflower crop. This study aimed to assess the efficacy of Arbuscular mycorrhizal fungus against charcoal rot disease as fungicide alternative.

Results

Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Encoding errors in reading the first grade of primary (analytical study)
...Show More Authors

    Aims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level

View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Flocculation on The ethanolic Production in Some Various Yeast
...Show More Authors

Ethanol production were evaluated by many strains with varing

degree of flocculation in fermentation medium of date extract withl 0

Brix, PHS in 30C0Ø¢  Ø¢ for Ø¢ 48hr.lt was found that ethanol production decrease with increase of flocculation degree and non-flocculant strain is Ø¢ more efficient in Ø¢ producing ethanol from flocculant strain,then

ethanol sensitivity were examined for the same strains, in liquid medium YE, it was found thatØ¢  Ø¢ strain is more sensitive from nonآ­ flocculant and ethanol sensitivity depends upon flocculation degree.

 

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus