The Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin Cefotoxam and Methoprim.
To determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 pos
... Show MoreTo determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 pos
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreObjective: Comprehending microbial diversity and antibiotic resistance patterns is essential for efficient treatment protocols. This study sought to determine the incidence of bacterial and fungal pathogens responsible for burn and wound infections and their antibiotic susceptibility profiles. Methods: This cross-sectional study involved 140 patients with burn or wound infections. Sterile swabs and pus aspiration were employed to collect samples, which were subsequently processed using standard microbiological procedures. Antibiotic resistance was determined using the Kirby-Bauer disc diffusion method, following Clinical and Laboratory Standards Institute (CLSI) guidelines. Data was analysed using IBM SPSS version 25.0, and the Chi-
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More