Preferred Language
Articles
/
aBhLNJUBVTCNdQwCSiro
A Novel Algorithm for Predicting Antimicrobial Resistance in Unequal Groups of Bacterial Isolates
...Show More Authors

Choosing antimicrobials is a common dilemma when the expected rate of bacterial resistance is high. The observed resistance values in unequal groups of isolates tested for different antimicrobials can be misleading. This can affect the decision to recommend one antibiotic over the other. We analyzed recalled data with the statistical consideration of unequal sample groups. Data was collected concerning children suspected to have typhoid fever at Al Alwyia Pediatric Teaching Hospital in Baghdad, Iraq. The study period extended from September 2021 to September 2022. A novel algorithm was developed to compare the drug sensitivity among unequal numbers of Salmonella typhi (S. Typhi) isolates tested with different antibacterials. According to the proposed algorithm, the predicted resistance values were more valid than the observed values. This proposed algorithm is expected to help the hospital antibiotic policy committee recommend the proper antibacterial agents for S. Typhi and further bacterial isolates.

Scopus Crossref
View Publication
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Computers And Electronics In Agriculture
A novel heat-pulse probe for measuring soil thermal conductivity: Field test under different tillage practices
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
COMPARATIVE STUDY BETWEEN A NOVEL DETERMINISTIC TEST FOR MERSENNE PRIMES AND THE WELL-KNOWN PRIMALITY TESTS
...Show More Authors

In this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
The origin of bacterial contamination in AL-Habania reservoir in Iraq
...Show More Authors

Bacterial contamination of AL-Habania reservoir was studied during the period from February 2005 to January 2006; samples were collected from four stations (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir). Coliform bacteria, faecal Coliforms, Streptococci, and faecal Streptococci were used as parameters of bacterial contamination in waters through calculating the most probable number. Highest count of Coliform bacteria (1500 cell/100ml) was recorded at AL-Razaza during August, and the lowest count was less than (300 cell/100ml) in the rest of the collection stations for all months. Fecal Coliform bacteria ranged between less than 300 cells/100ml in all stations for all months to 700 c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Biochemical & Cellular Archives,
BACTERIAL CONTAMINATION OF IRAQI BANKNOTES CURRENCY IN CIRCULATION IN BAGHDAD CITY
...Show More Authors

The present study was identified the type of bacterial contamination of Iraqi banknotes currency (Iraqi dinars) in circulation. 68 Iraqi banknotes currency of different denominations samples were randomly gathered from different locations and different occupational groups in Baghdad city. The results showed 61 (89.70%) of the samples were determined to be contaminated with bacteria, whereas 7 (10.29%) were confirmed to be sterile. A total of 11 different species of bacteria resulting in 72 isolates were found from those 61 contaminated Iraqi banknotes currency. Based on culture, morphological and biochemical tests, 11 isolates were identified as Bacillus sp., Staphylococcus aureus, Staphylococcus epidermidis, Corynebacterium diphtheria, Leu

... Show More
Publication Date
Mon Oct 27 2025
Journal Name
International Journal Of Veterinary Sciences And Animal Husbandry
Review of multidrug sensitivity and resistance in enterococcus
...Show More Authors

Review of multidrug sensitivity and resistance in enterococcus

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Speech Enhancement Algorithm Based on a Hybrid Estimator
...Show More Authors
Abstract<p>Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Some Games Via (D, DL) Compact Topological Groups
...Show More Authors

    The aim of our work is to develop a new type of games which are related to (D, WD, LD) compactness of topological groups. We used an infinite game that corresponds to our work. Also, we used an alternating game in which the response of the second player depends on the choice of the first one. Many results of winning and losing strategies have been studied, consistent with the nature of the topological groups. As well as, we presented some topological groups, which fail to have winning strategies and we give some illustrated examples. Finally, the effect of functions on the aforementioned compactness strategies was studied.  

Preview PDF
Scopus (2)
Scopus Crossref