Preferred Language
Articles
/
bsj-3937
Detection of 16S rRNA Methylases and Co-Resistance with β-lactams among Klebsiella pneumoniae Isolates from Iraqi Patients
...Show More Authors

Out of 150 clinical samples, 50 isolates of Klebsiella pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 25 (50%) of isolates were resistant to gentamicin (≥16µg/ml), 22 (44%) of isolates were resistant to amikacin (≥64 µg/ml), 21 (42%) of isolates were resistant to ertapenem (≥8 µg/ml), 18 (36%) of isolates were resistant to imipenem (4- ≥16µg/ml), 43 (86%) of isolates were resistant to ceftriaxone (4- ≥64 µg/ml), 42 (84%) of isolates were resistant to ceftazidime (16-64 µg/ml), and 40 (80%) of isolates were resistant to cefepime (4- ≥16µg/ml). Co-Resistance for both β-lactams and aminoglycosides were detected among 25 (50%) of K. pneumoniae isolates. The extended spectrum beta-lactamases (ESBLs) were detected among 25 (50%) of K. pneumoniae isolates. Screening of 16S rRNA methylases  encoding genes revealed that armA was found in 5 (10%) of K. pneumoniae isolates, whereas rmtB was not found among K. pneumoniae isolates. DNA sequencing of armA revealed that the presence of missense mutations in which affected in the translation of protein by substitutions of amino acids, leading to increase the resistance values of MICs for gentamicin and amikacin. These variants were registered in NCBI at the accession number LC373258. The phylogenetic tree of armA variants showed a slight deviation of these variants from K. pneumoniae species.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Viral Marketing Technologies on Consumer Behavior _ A survey of a sample of students from the college of administration and economics
...Show More Authors

Abstract:

Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.

The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Forced State Fair Workers "Trades and professions" To work from the perspective of the Islamic economy
...Show More Authors

The origin of occupations and trades producing goods and services necessary for the members of society
When people are designated to perform this task, in which case the state of change is included in the imposition of adequate labor rights, and may change from imposing sufficient to imposing the eye
Does the state have the right to compel "tradesmen and professions" to do their jobs?
Therefore, this research came to address the legitimacy of this from the perspective of the Islamic economy.

View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Practical comparation of the accuracy and speed of YOLO, SSD and Faster RCNN for drone detection
...Show More Authors

Convolutional Neural Networks (CNN) have high performance in the fields of object recognition and classification. The strength of CNNs comes from the fact that they are able to extract information from raw-pixel content and learn features automatically. Feature extraction and classification algorithms can be either hand-crafted or Deep Learning (DL) based. DL detection approaches can be either two stages (region proposal approaches) detector or a single stage (non-region proposal approach) detector. Region proposal-based techniques include R-CNN, Fast RCNN, and Faster RCNN. Non-region proposal-based techniques include Single Shot Detector (SSD) and You Only Look Once (YOLO). We are going to compare the speed and accuracy of Faster RCNN,

... Show More
View Publication Preview PDF
Crossref (21)
Crossref
Publication Date
Mon Dec 02 2024
Journal Name
Iranian Society Of Parasitology
Single Nucleotide Polymorphism of IL-18 (Rs 1946519) in Recurrent Aborted Iraqi Women and Its Association with Toxoplasmosis
...Show More Authors

Publication Date
Tue Aug 05 2025
Journal Name
Mustansiria Dental Journal
Soft tissue measurements of Iraqi individuals with Cl I and Cl III skeletal pattern: a comparative cephalometric study
...Show More Authors

View Publication
Publication Date
Tue Jun 03 2025
Journal Name
Sar Journal Of Pathology And Microbiology
The Relation between Tumor Infiltrating Lymphocyte and Classical Tumor Staging in Colorectal Carcinoma (Semi-Quantitative Study by Immun histochemistry in a Group of Iraqi Patients)
...Show More Authors

Inflammatory response had a role in cancer progression, presence of noticeable inflammation within the tumor and its margin may play an important prognostic role in colorectal carcinoma.

Preview PDF