Article information: COVID-19 has roused the scientic community, prompting calls for immediate solutions to avoid the infection or at least reduce the virus's spread. Despite the availability of several licensed vaccinations to boost human immunity against the disease, various mutated strains of the virus continue to emerge, posing a danger to the vaccine's ecacy against new mutations. As a result, the importance of the early detection of COVID-19 infection becomes evident. Cough is a prevalent symptom in all COVID-19 mutations. Unfortunately, coughing can be a symptom of various of diseases, including pneumonia and inuenza. Thus, identifying the coughing behavior might help clinicians diagnose the COVID-19 infection earlier and distinguish coronavirus-induced from non-coronavirus-induced coughs. From this perspective, this research proposes a novel approach for diagnosing COVID-19 infection based on cough sound. The main contributions of this study are the encoding of cough behavior, the investigation of its unique characteristics, and the representation of these traits as association rules. These rules are generated and distinguished with the help of data mining and machine learning techniques. Experiments on the Virufy COVID-19 open cough dataset reveal that cough encoding can provide the desired accuracy (100%).
In present study 74 specimens of urine were collected from patients suffering from urinary tract infections.Fifty (67.56%) isolates were identified as Escherichia coli. 78% of isolates were identified as extendedspectrum beta lactamases (ESBL) producer. Antibiotic susceptibility t est was done and ceftazidime wasselected to complete this study by implying stress at sub-MIC on isolate harbor high number of resistancegenes (N11) and compared with sensitive isolate (S). Only four β-lactamase coding genes were detected;blaTEM, blaPER, blaVIM and blaCTX-M-2 and N11 had blaTEM, blaPER, and blaVIM. It was found that the resistantisolate did not form biofilm when compared with the sensitive one, which formed moderate biofilm. Inaddition, ceftazidi
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear
... Show MoreOxidative stress markers are of important diagnostic parameters for many disorders including cholelithiasis. This present study has aimed to assess the state of oxidative stress in symptomatic radiographically confirmed (Cholelithiasis) patients by measuring two parameters used as oxidative stress parameters which are serum myeloperoxidase (MPO) and superoxide dismutase (SOD). This study was carried out on 100 patient diagnosed as (Cholelithiasis) patients with 30 age and sex matched healthy controls by measuring serum (MPO) and (SOD) by ELIZA technique .Results showed significantly decrease in antioxidant enzyme(SOD) and increase in serum level of (MPO) comparing with controls.
Keywords: Cholelithiasis , Oxidative stress
... Show MoreWaste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.
Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu
... Show MoreObjective(s): To evaluate of nurses practice toward orthopaedic wound infection and to determine the
relationship between orthopaedic nurses practice and their demographic data characteristic
Methodology: A descriptive study was carried out at orthopaedic wards of Baghdad Teaching Hospital started
from February 1
st, 2011 to August 30th, 2011. A non-probability sample of (39) orthopaedic nurses who were
working in orthopaedic wards were selected from Baghdad Teaching Hospital. The data were collected through
the use of questionnaire , which consists of two parts (1)Demographic data form that consists of a(10) items
and (2) orthopaedic nurses practice form that consists of (4)sections contain (69) items, by mean of di