Preferred Language
Articles
/
bsj-3937
Detection of 16S rRNA Methylases and Co-Resistance with β-lactams among Klebsiella pneumoniae Isolates from Iraqi Patients
...Show More Authors

Out of 150 clinical samples, 50 isolates of Klebsiella pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 25 (50%) of isolates were resistant to gentamicin (≥16µg/ml), 22 (44%) of isolates were resistant to amikacin (≥64 µg/ml), 21 (42%) of isolates were resistant to ertapenem (≥8 µg/ml), 18 (36%) of isolates were resistant to imipenem (4- ≥16µg/ml), 43 (86%) of isolates were resistant to ceftriaxone (4- ≥64 µg/ml), 42 (84%) of isolates were resistant to ceftazidime (16-64 µg/ml), and 40 (80%) of isolates were resistant to cefepime (4- ≥16µg/ml). Co-Resistance for both β-lactams and aminoglycosides were detected among 25 (50%) of K. pneumoniae isolates. The extended spectrum beta-lactamases (ESBLs) were detected among 25 (50%) of K. pneumoniae isolates. Screening of 16S rRNA methylases  encoding genes revealed that armA was found in 5 (10%) of K. pneumoniae isolates, whereas rmtB was not found among K. pneumoniae isolates. DNA sequencing of armA revealed that the presence of missense mutations in which affected in the translation of protein by substitutions of amino acids, leading to increase the resistance values of MICs for gentamicin and amikacin. These variants were registered in NCBI at the accession number LC373258. The phylogenetic tree of armA variants showed a slight deviation of these variants from K. pneumoniae species.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Eastern Mediterranean Health Journal
Knowledge and practices of women in Iraqi universities on breast self examination
...Show More Authors

This study evaluated the knowledge and practice of breast self-examination (BSE), among a sample of educated Iraqi women. The study sample comprised 858 women aged 18–62 years affiliated to 6 major Iraqi universities, categorized according to occupation as teaching staff (11.5%), administrative staff (18.0%) and students (70.5%). Data were collected by a self-completed questionnaire. In all, 93.9% of the women had heard about BSE, the main source of information was television (39.9%), doctors (18.4%) and the awareness campaign of the Iraqi National Breast Cancer Research Programme (11.6%). Only 53.9% of the women practised BSE; the most common excuses by those that did not were lack of knowledge of the significance of BSE (42.0%) and lack

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
‘There is no place like home’: A Comparative Study of the Meaning of Home in The Wonderful Wizard of Oz and Peter and Wendy
...Show More Authors

The Wonderful Wizard of Oz and Peter and Wendy present universal ideas that exist in all times, despite being written in the beginning of the 20th century. Among the most significant ones is the concept of “home”. The article discusses the essentiality of the idea of “home” where the identity of an individual shapes, and where one’s spiritual, psychological, and physical being develop. It also studies the attitudes of each protagonist towards the concept of ‘home’ based on their understanding of it and according to their gender differences. The characters in both stories tread on the path of perplexity between leaving their homes and returning to them. Peter’s world is the world of imagination while Doro

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2013
Journal Name
مجلة كليه التربيه الاساسيه
صعوبات تدريس مادة الكيمياء الكمية في قسم الكيمياء - كلية التربية - للعلوم الصرفة من وجهة نظر تدريسي المادة و الطلبة
...Show More Authors

تعد أساليب وطرائق تدريس المواد الدراسية العلمية من المجالات المهمة التي تساعد في تحويل المجرد إلى ثوابت في الذهن وترفع مستوى خبرات كل من المعلم والمتعلم على حد سواء إضافة إلى إنها جزء لا يتجزأ من العملية التربوية ومن الركائز المهمة التي تقوم عليها المناهج الدراسية لأنها تساعد الطلبة على اكتساب مهارات ومعلومات وتكوين اتجاهات وميول تخدم أهداف تدريس المادة وبما أن مادة الكيمياء الكمية هي إحدى المواد الدراسية

... Show More
Publication Date
Mon Dec 30 2024
Journal Name
Modern Sport
The Impact of a Psychological Counselling Program on Unconscious Conflicts and Free Will among Coaches of Selected Athletic Disciplines
...Show More Authors

هدف البحث إلى بناء مقياسين تخصصين للنزاعات اللاشعورية وحرية الإرادة لمدربي بعض ألعاب القوى والتعرف على مستوى كل منهما لديهم، وإعداد برنامج إرشادي نفسي مستند لرفع مستوى الحالات اللاشعورية وحرية الإرادة للمدربين الذين يعانون من انخفاض مستوى النزاعات اللاشعورية وحرية الإرادة، والتعرف على تأثير البرنامج الإرشادي نفسي في النزاعات اللاشعورية وحرية الإرادة لدى مدربي بعض ألعاب القوى، لتفترض بذلك الباحثة بإ

... Show More
View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus