This study was carried out for direct detection of typhi and some of its multidrug resistance genes(tem,capt,gyrA&sul2)which encode for resistance to (Ampicillin, Chloramphenicol,Ciprofioxacin,Co-trimoxazole)by using Polymerase Chain Reaction technique .(71)blood samples for people suffering from typhoid fever symptoms depending on the clinical examination and (25)for control were collected. The results investigation for flic gene which encode for flagellin protein indicated that only (19)with percentage of (26,76%)gave appositive results while all control had a negative ones. Investigation for antibiotic resistance drug in samples which show positive results for flic gene showed that there is a multidrug for all antibiotics with (94.73%) in patients
In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreEl español es una lengua hablada por una ingente comunidad que abarca varios cientos de millones de personas. Son muchas las palabras con distintos significados que se escriben de similar manera. Hablamos, por ejemplo, de dos de ellas: el adjetivo solo y el adverbio sólo.
En este trabajo se plantea un estudio del adverbio sólo, palabra invariable cuya función consiste en (complementar la significación del verbo) y solo es un adjetivo (califica a un sustantivo).¿Cómo diferenciarlas para evitar errores ortográficos? Así, en estos casos (solo/ sólo), la distinción la da la tilde en la primera vocal. Ésta es la
... Show MoreOne of the serious problems in any wireless communication system using multi carrier modulation technique like Orthogonal Frequency Division Multiplexing (OFDM) is its Peak to Average Power Ratio (PAPR).It limits the transmission power due to the limitation of dynamic range of Analog to Digital Converter and Digital to Analog Converter (ADC/DAC) and power amplifiers at the transmitter, which in turn sets the limit over maximum achievable rate.
This issue is especially important for mobile terminals to sustain longer battery life time. Therefore reducing PAPR can be regarded as an important issue to realize efficient and affordable mobile communication services.
... Show More
Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as K
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show MoreExponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show More