Antibiotic resistance increment is a major problem for the human society nowadays which encourages the efforts to look for new therapeutic alternatives from natural defenses. Synergistic antibacterial activity of epidermin and staphylolysin LasA A against Staphylococcus aureus (Staph aureus), Escherichia coli (E. coli) and Pseudomonas aeruginosa (Ps. aeruginosa) was evaluated. The antibacterial activities of epidermin from Staphylococcus epidermidis (Staph epidermidis) and Staphylolysin (LasA) from Ps. aeruginosa using the agar well diffusion assay were evaluated, and then using the micro dilution method to evaluate the minimum inhibitory concentration (MIC) and the minimum bactericidal concentration (MBC). The checkerboard method and fractional inhibitory concentration (FIC) were used to evaluate the combination between epidermin and LasA toward targeted clinical isolates of Staph aureus, E. coli and Ps. aeruginosa. The results revealed a synergistic effect between epidermin and LasA on all clinical isolates growth. The highest MIC and MBC of epidermin were 36.04 µL/mL and 51.73 µL/mL against Staph aureus; meanwhile, the highest MIC and MBC of LasA were 44.38 µL/mL and 50 µL/mL against Staph aureus. The FICindex revealed synergistic interactions in combination of epidermin and LasA which recorded 0.286 for Staph aureus while for E. coli was 0.327 and for Ps. aeruginosa was 0.390 respectively showing a synergism effect. This study finds that combination of epidermin with LasA had inhibitory activity on the targeted clinical isolate growth, which can be useful for designing and developing alternative therapeutic strategies against pathogens causing wound and burn infections.
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreChronic renal failure (CRF) is progressive irreversible destruction of kidney tissue by disease which, if not treated by dialysis or transplant, will result in patient's death. This study was carried out on 30 patients (17 male and 13 female) with chronic renal failure. The aim of this research was studied the changes in the level of total protein ,albumin, calcium ,ionized calcium, phosphorous , iron ,ALP, LDH ,CK and FFA in patients with CRF before and after hemodialysis .The obtained results have been compared with 30 healthy subjects as control group (18male and 12 female). The results showed that there was significant increase in the level of calcium ,ionized calcium, phosphorous ,iron ,ALP,LDH,CK and FFA ,while there was a signifi
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
In this paper, the class of semi
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreParents who give their sons arole in making parental decisions and admiring their views are the ones who build confidence and the feeling of competence within themselves and then their edgiest- rent with themselves becones better .
The (A.B) person-ality type is the core base of most psychological and educational studies because it is one of the most important subjects Concerning with the study of growth aspects whether they are physical, mental or Social. The present Study ains to measure the level of parental treatment among high School students, measure the level of (A) Personality type concept among them, recognize Statistically Significant differences in the level of parentaltreatment according gender variable and recognize the C