This study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate persence were non-significant (P<0.05). The results of antibioticsusceptibility were determined using Vitek-2GN system; .sakazakii isolates showed 100% resistance to cefazolin and cefoxitin, but were highly sensitive to many antibiotics includes (Imipenem, Meropenem, Amikacin, Gentamicin, Tobramycin, Ciprofloxacin, Levofloxacin, Nitrofurantion, Trimethoprim sulfamethoxazole, Ampicillin, Ampicillin sulbactam, Pipercillin Tazobactam, Ceftazidime, Ceftriaxone, Cefepime Azetreonam and augmentin ). The present study did not determine C.sakazakii in all the samples of PIF that is available in the local markets.
Coronavirus diseases 2021 (COVID-19) on going situation in Iraq is characterized in this paper. The pandemic handling by the government and the difficulties of public health measures enforcement in Iraq. Estimation of the COVID-19 data set was performed. Iraq is endangered to the pandemic, like the rest of the world besides sharing borders with hotspot neighbouring country Iran. The government of Iraq launched proactive measures in an attempt to prevent the viral spread. Nevertheless, reports of new cases keep escalating leaving the public health officials racing to take more firm constriction to face the pandemic. The paper bring forth the current COVID-19 scenario in Iraq, the government measures towards the public health challenges, and
... Show MoreHeavy metal (HM) pollution has long been a significant source of environmental deterioration and a problem for the safety of food. Iraqis prefer rice over any other food, and since heavy metals have a direct impact on health, their traces in rice have drawn particular attention. Before cooking rice, it is usual in Iraq to wash and soak it. Some 55 varieties of imported and local rice were sampled from Erbil city markets in 2022 with the aim of determining the concentration of As, Cd, Cr, Ni and Pb before and after soaking. Standard procedure of acid digestions was applied on the raw and soaked samples. The solutions were analyzed using ICPE-9820 Shimadzu. The mean concentrations of As, Cd, Cr, Ni and Pb (in mg/kg) in the rice samples bef
... Show MoreIn the present time, radioactive contamination is considered one of the most dangerous types of environmental pollution. It usually takes place because of a leakage of radioactive materials to one of the environment natural components, such as, water, air, and soil. Iraq is considered one of the most contaminated environments in the world; this is closely associated with the wars Iraq had suffered from; especially, in 1991 and 2003. Considering the importance of the radioactive contamination and its different health impacts on the population, the current paper is interested in studying this type of environmental contamination and its impact on the birth defects depending on the data available in the annual reports issued by the Iraqi min
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More