Preferred Language
Articles
/
ijs-2398
Role of oqxA and oqxB Genes in the Development of Multidrug Resistant Phenotype among Clinical Klebsiella pneumoniae Isolates from Various Cases
...Show More Authors

This study investigated the prevalence of oqxA and oqxB genes and their effective roles in the development of multidrug resistant (MDR) phenotype among clinical isolates of Klebsiella pneumoniae. Out of 150 clinical samples, 50 (33%) isolates were recognized as K. pneumoniae according to the morphological and biochemical properties. The minimum inhibitory concentrations (MICs) assay revealed that the resistance values of the isolates were 43 (86%) against ceftriaxone (4- ≥64 µg/ml), 42 (84%) against ceftazidime (16- ≥64 µg/ml), 41 (82%) against cefepime (≥16 µg/ml), 21 (42%) against ertapenem (≥8 µg/ml), 18 (36%) against imipenem (4- ≥16 µg/ml), 15 (30%) against ciprofloxacin (≥4 µg/ml), 11 (22%) against levofloxacin (≥8 µg/ml), 45 (90%) against nitrofurantoin (128- ≥512 µg/ml), 36 (72%) against trimethoprime-sulfamethoxazole (≥320 µg/ml), and 4 (8%) against tigecycline (≥8 µg/ml). Genotype detection revealed that oqxA was found in 48 (96%) of K. pneumoniae isolates, whereas oqxB was found in 6 (12%) isolates. The MDR phenotype was observed in 40 (80%) isolates, of which 38 (95%) were harbored oqxA and/or oqxB genes. DNA sequencing of oqxA revealed the presence of three silent mutations. The phylogenetic tree of oqxA variants showed a significant deviation of these variants from K. pneumoniae species. The high prevalence of oqxA among K. pneumoniae isolates may contribute to the reduction of their susceptibility to multiple antimicrobial agents.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Electrochemical Deposition of Hydroxyapatite Co-Substituted By Sr/Mg Coating on Ti-6Al-4V ELI Dental Alloy Post-MAO as Anti-Corrosion
...Show More Authors

This work involved the co-substitution of the two bioactive ions of strontium and magnesium into the hydroxyapatite (HA) coating which was then electrochemically deposited on Ti-6Al-4V ELI dental alloy (Gr.23) before and after treatment by Micro Arc Oxidation (MAO). The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of the coating layer was estimated by using pull-off adhesion test. The adhesion strength of Sr/Mg-HA on the Ti-6Al-4V ELI dental alloy after MAO treatment was 1.79 MPa, which was higher than that before MAO treatment (1.62 MPa). The corrosion behavior of th

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Entropy-Based Feature Selection using Extra Tree Classifier for IoT Security
...Show More Authors

      The Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Skin Detection using Improved ID3 Algorithm
...Show More Authors

Skin detection is classification the pixels of the image into two types of pixels skin and non-skin. Whereas, skin color affected by many issues like various races of people, various ages of people gender type. Some previous researchers attempted to solve these issues by applying a threshold that depends on certain ranges of skin colors. Despite, it is fast and simple implementation, it does not give a high detection for distinguishing all colors of the skin of people. In this paper suggests improved ID3 (Iterative Dichotomiser) to enhance the performance of skin detection. Three color spaces have been used a dataset of RGB obtained from machine learning repository, the University of California Irvine (UCI), RGB color space, HSV color sp

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Nano Research
A Specific NH&lt;sub&gt;3&lt;/sub&gt; Gas Sensor of a Thick MWCNTs-OH Network for Detection at Room Temperature
...Show More Authors

NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi

... Show More
View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Colloid Interface Science
Corrigendum to “Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage” [J. Colloid Interface Sci. 534 (2019) 88–94]
...Show More Authors

Erratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.

Scopus Clarivate Crossref
Publication Date
Thu Jun 06 2013
Journal Name
Advances In Physics Theories And Applications
Adsorption study of Symmetrical schiff base ligand 4,4 -[hydrazine -1,2- diylidenebis ( methan-1-yl-1-ylidene) bis ( 2-methoxyphenol)] on Granulated Initiated calcined Iraqi …
...Show More Authors

Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF