Preferred Language
Articles
/
bsj-4124
Detection of CTX-M-type ESBLs from Escherichia coli Clinical Isolates from a Tertiary Hospital, Malaysia
...Show More Authors

The present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%).  After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL producing E. coli against antibiotics belonging to different families showed the highest resistance rates to Ampicillin (100%), Cefotaxime (97%), Cefuroxime (95%), and Ciprofoxacin (86%). Carbapenem groups of antibiotics, Meropenem (89%) and Imipenem (85%) have the highest susceptibility rate among all antibiotics used in this study. The outcome of the antimicrobial susceptibility testing of significant CTX-M- type ESBL producing E. coli could be useful to avoid failure or prolong treatments.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
Journalistic recruitment for the Infographics news sites Bairaq hussien jumhaa al ruba
...Show More Authors

The aim of the research is to find out the methods of employing the : Infographics in the news sites due to the different communicative roles of the : Infographics . To achieve the research objective, the researcher used the survey method: the method of analyzing the content to analyze the : Infographics material from the selected sample of the news sites. What was said ? And how was it said? Through the design of a content analysis form that includes a number of studied analysis Infographics of the study.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets
...Show More Authors

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
دور الوظيفة الاتصالية للصحافة في المساعدة على الهروب من التوتر والاغتراب
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat Jan 31 2026
Journal Name
Journal Of The College Of Education
العدل الإلهي في العراق القديم من خلال نصوص مختارة دراسة تاريخية
...Show More Authors

شغلت نظرية العدل الإلهي بال الأديب العراقي القديم، مما جعلته يثير عبر نصوصه الأدبية كثير من التساؤلات حول عدالة الإلهة، التي يعبدها ويقدم لها الهدايا وتساؤلاته هذه دفعت بالباحث إلى اختيارها عنوانا لموضوعه، إلا أن الدراسة ستختصر على نصوص معينة، والسبب في ذلك أنها كانت الرائدة في هذا الجانب، وفي اللحظة التي ينتقي فيها العدل الإلهي وتتحول الإلهة إلى كلاب تلهث وراء غرائزها، ذهبنا وراء الأسباب التي قادت إلى فقد

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 25 2023
Journal Name
مجلة كلية القانون والعلوم السياسيةفي الجامعة العراقية
التدابير الدولية لحماية المرأة من العنف الجندري وأثرها على التشريعات العراقية
...Show More Authors

المرأة نصف المجتمع , وهي التي تلد النصف الاخر وتربيههكذا وصفها الحكماء ولا مسار لارتقاء أي بلد وتقدم أي شعب بدون الارتقاء بالمرأة, وبدون مشاركتها في مسارات التحول والتغيير, لكن المرأة مازالت تعاني من التمييز على أساس النوع , وتتعرض للعنف الجندري مما يشكل عائقا كبيرا امام مشاركتها الحقيقية والفعالة في قيادة دفة الحياة , والأخذ بها نحو عيش حياة طييبة كريمة. تؤكد الوثائق أن العنف القائم على النوع الاجتماعي من الم

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Four Level Prior Distributions
...Show More Authors

Abstract:

      In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
المجلة الدولية للدراسات التربوية والنفسية
الخبرات الصادمة وعلاقتها بالسلوك الفوضوي لدى عينة من طلبة المرحلة المتوسطة
...Show More Authors

هدفت الدراسة إلى الكشف عن العالقة بين الخبرات الصادمة والسلوك الفوضوي لدى طلبة المرحلة المتوسطة فضال عن التعرف على الفروق بين الطلبة في الخبرات الصادمة والسلوك الفوضوي على وفق متغير النوع )الذكور- اإلناث(، تألفت عينة الدراسة من )185( طالباً وطالبة، وتم تطبيق مقياسا الدراسة على العينة- مقياس الخبرة الصادمة ومقياس السلوك الفوضوي وهما )من إعداد الباحثان(، وقد أسفرت نتائج الدراسة عن: - إن طلبة المرحلة المتوسطة أظهر

... Show More
View Publication Preview PDF