In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidime stress reduced the ability to produce slime layer and affected the viable bacterial countin combination with pH and temperature stresses. (PDF) Effectiveness of some β-lactamase encoding genes on biofilm formation and slime layer production by uropathogenic Escherichia coli. Available from: https://www.researchgate.net/publication/326088490_Effectiveness_of_some_b-lactamase_encoding_genes_on_biofilm_formation_and_slime_layer_production_by_uropathogenic_Escherichia_coli [accessed Jan 18 2025].
A series of 1,3-diarylprop-2-en-1-one oximes (7-12) were synthesized via reaction of 1,3-diarylprop-2-en-1-one (1-6) with NH2OH. HCl in dry pyridine. In order to produce the required products (13-18) as anti-isomers, these products (7–12) were then treated with acetic anhydride in dry pyridine. Different substitutes are maintained, resulting in the separation of different products in different yields The recently produced esters are thought to be useful as building blocks for the synthesis of substituted pyridines and many other nitrogen-holding complexes, which are elaborate structures in medicinal chemistry and present in a variety of pharmaceutical medications. The synthesized products were characteriz
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by
Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and
Aims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level
Ethanol production were evaluated by many strains with varing
degree of flocculation in fermentation medium of date extract withl 0
Brix, PHS in 30C0آ آ for آ 48hr.lt was found that ethanol production decrease with increase of flocculation degree and non-flocculant strain is آ more efficient in آ producing ethanol from flocculant strain,then
ethanol sensitivity were examined for the same strains, in liquid medium YE, it was found thatآ آ strain is more sensitive from nonآ flocculant and ethanol sensitivity depends upon flocculation degree.
Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More