JM Karhoot, AA Noaimi, WF Ahmad, The Iraqi Postgraduate Medical Journal, 2012 - Cited by 7
This study is designed to isolate and molecular identification of C. gattii, C. gattii is pathogenic yeast and effect immunocomposed and immunocompetent, Methods: collect 50 samples from eucalyptus leaves. The collection time was extended from November 2021 to February 2022 and then culture at SDA, Cryptococcus Differential Agar esculin agar and Eucalyptus leaves agar, Brain heart infusion agar with methyldopa and Brain heart infusion agar with methyldopa media, biochemical test including urease test, and then confirm identification by molecular identification by PCR technique sequencing and genetic analysis. The results showed that 4 swaps taken from eucalyptus leaves included cryptococcus neoformans. This study indicated that the virulenc
... Show MoreThe hydrolysis of urea by the enzyme urease is significant for increasing the irroles in human pathogenicity, biocementation, soil fertilizer, and subsequently in soil improvement. This study devoted to the isolation of urease from urea-rich soil samples collected from seven different locations. Isolation of the various bacterial species was conducted using nutrient agar. The identity of isolated urease was based on morphological characteristics and standard microbiological and biochemical procedures. The urease producing strains of bacteria were obtained using the urease hydrolysis test. The bacterial isolates produced from soil samples collected from different environments and treat
Five species of Lactic acid bacteriawere isolated from raw milk, yoghurt, vegetables and pickles, Lactobacillus plantarum, Lactobacillus acidophilus, Lactobacillus brevis, Lactobacillus casei and Lactobacillus bulgaricus isolates were identified by 16S rRNA gene. Evaluate of antimicrobial activity against all the bacterial strains Staphylococcus aureus, Salmonella spp., Pseudomonas fluorescens, Escherichia coli, Bacillus cereus and Bacillus subtilis. It showed that bacteriocin of Lactic acid bacteriamore effective than supernatant of lactic acid bacteria, the results showed that isolatemost efficient isolate belonging to Lactobacillus brevis, the diameter of the inhibition of the bacteriocin of Lactobacillus brevis were 27.7, 26.3 and 25.1
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show More