Respiratory tract infections in sheep are among the important health problems that affect all sheep ages around the world. Nine bacterial isolates obtained from sheep with respiratory tract infections were selected to be used in the current study. The isolates included 3 Staphylococcus aureus, 4 Klebsiella pneumoniae, and 2 Pseudomonas aeruginosa. Following the primers design by the Primer3Plus software tool and optimization of the conventional polymerase chain reaction (PCR), the primers were validated for their use in the multiplex PCR experiments. The MFEprimer program was used to check the suitability of the primer set combinations for multiplex PCR. The MFEprimer software was successful in designing the multiplex-PCR experiments and determining the optimal primer set combinations. Multiplex PCR was able to amplify specific DNA sequences of one, two or three target genes of these mixed microorganisms in the same PCR reaction tube. This technique efficiently detected combinations of two organisms, either S. aureus with K. pneumoniae, S. aureus with P. aeruginosa or K. pneumoniae with P. aeruginosa. Moreover, multiplex PCR was also able to detect the presence of the three organisms together in the same reaction tube. To conclude, this study confirmed multiplex-PCR as a specific, sensi- tive, rapid, accurate, and cost-effective molecular diagnostic method for identification and differentiation of three clinically important bacteria associated with sheep respiratory tract infections, including S. aureus, P. aeruginosa, and K. pneumoniae. This can efficiently support control and treatment of such diseases and would increase the economy of the animals’ owners and wellbeing of the animals.
Rheumatoid arthritis and periodontitis use analogous effector destructive procedures, in that the inflammatory cells and pro-inflammatory cytokines that drive chronic bone erosion in RA and chronic periodontal destruction in Periodontitis are alike. Periodontitis (PD) has appeared as a hazard factor in a number of health situations as rheumatoid arthritis (RA). To determine the effect of anti-tumor necrosis factor alpha biological treatment (methotrexate and Enbrel or infliximab) on periodontal status of patients having rheumatoid arthritis with periodontitis in comparison to those having periodontitis without rheumatoid arthritis and control healthy subjects and to determine the serum levels of anti-cyclic citrullinated peptide (ACCP) in t
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More