The increasing use of antiseptic compounds creates selective pressure cause emergence of antiseptic resistance among Staphylococcus aureus .Resistance mechanism of antiseptic is driven mainly by multi drug resistant (MDR) efflux protein.Sixty five isolates of S.aureuswere collected from different clinical sources and subjected to 11 antibiotics most of them are recognized by efflux systems as extruded substrates. Range of efflux activity was estimated using cartwheel method. Simultaneous discrimination of antiseptic coding genes (qacA/B, smr and norA)as well as nuc and mecA genes among multidrug resistantS.aureus(MRSA) isolates was preformed using multiplex PCR assay , 61 isolatesamong 65 were positive tonucand mecA genes, 58 of them were positive to norA, 14 of them were positive to qacA/B and only two were positive to smr. All isolates detected with qacA/B characterized by fluoroquinolones resistant and most of them show strong efflux activity at cartwheel assay, all of the 14 isolates positive qacA/B were sequenced to differentiate between variants depending on position 323 (aspartic in QacA, alanine in QacB), 3 of them harbored asparagines amino acid at position 323 and considered to be a new variants that reported for the first time.
SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).
The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effe
... Show MoreRole of public relations (PR) and from one community to another, depending on the different cultures of these societies in General, and different ethical values established by their practitioners in these communities organizations , public relations in developed societies, and in some developing countries have taken great strides to contribute to the strategic planning and decision-making, in the framework of their commitment to the values and ethical standards for practitioners, In contrast, we find that applied in Iraq still skips phase coordinate with different communication means with the aim of advertising and publicity for the organization. As a result of the limited recognition of the strategic and vital
... Show More