The control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastewater in Abu Nuwas) from February-July 2021. Out of 67 isolates of bacteria, only 40 isolates of E. coli were detected by Vitek2. The antibiotic-resistance was estimated by the disk diffusion method. All E.coli isolates were tested against 6 antibiotics. The results showed the high resistance antibiotic of E. coli against Ceftazidime 70%, with intermediate resistance to Cefotaxime 47.5%, and low resistance to the sulfa drugs as Trimethoprim 27.5% and quinolones antibiotics as ciprofloxacin 17.5%, aminoglycosides as Amikacin and Gentamycin 5% and 7.5%. Moreover, the results revealed that gyrA gene was detected in 4 isolates (10%) while drf1 and drf17 genes were in 2 isolates of each gene (5%).Whereas qepA gene has not appeared in isolates. In conclusion, the isolates of E.coli from the Tigris River showed low resistance to sulfa drugs and quinolones , aminoglycosides. The resistance genes (gyrA,drf1,drf17) were detected in a few isolates which may be explained by the horizontal transfer of plasmids that carried genes and their distribution among the family Enterobacteriaceae.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreWithin connected speech, RP speakers tend to shorten stressed long vowels end diphthongs in pre. Forties consonants in the same syllable on the basis of complementary Distribution, i.e., the phonological environment decides the influence of the forties plosives and fricatives, as far as they are in find position preceded by stressed long vowels and diphthongs, or particular voiced consonants plus vowels. The Iraqi learners, then, face.
Chronic Hepatitis B(CHB) is a serious sequel after Hepatitis B Virus infection, although the rate of chronicity is inverse with age but it may be associated with a significant proportion of deaths related to cirrhosis and liver cancer. HBV serology and measurement of hepatocytic enzymes with viral load can predict disease prognosis and response to treatment. HBeAg refers to a high viral replication and associated with more infectivity to others. This study aimed to determine the impact of HBeAg status in chronically infected patients on various baseline tests. A total of 90 patients with CHB infection who were included in this study. Several standardized measures used for liver function tests, viral load and hepatitis B serological
... Show MoreThe culturalization of gender action occupies a wide range in culture, thoughts and modern studies as well as in fine arts and the ways of expressing them.
Theater, as one of these arts, plays roles in establishing the fundamental concepts that aims at stating the uncontrollable deed of the social community. It remains one of the most effective and suitable means to confine the uncivilized practices to overcome a certain crisis after gender and cyborg in societies.
The research concentrates on studying the culturalization of gender action in the Iraqi theatrical address because of the effect it has on the modernizing thought in arts and theater literature. It consists of chapter one which deals w
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
The current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult
... Show More