Preferred Language
Articles
/
ijs-604
Synergistic Effect of Linezolid, Tigecycline, and Vancomycin on Staphylococcus Aureus Isolated From Iraqi Patients with Diabetic Foot Ulcers
...Show More Authors

Ninety nine swabs were collected from patients with diabetic foot ulcers (DFU), all swabs   were cultured on different selective media for screening, 46 isolates confirmed as S. aureus by API staph. The results of antibiotic susceptibility test revealed that all isolates were resistant to metronidazole, 34 isolates were resistant to cefoxitin, ceftriaxone, and meropenim, 23 isolates were resistant to ciprofloxacin and norfloxacin, 17 and 16 isolates were resistant to tetracycline and trimethoprim, respectively; while all isolates were sensitive to tigecycline. The results of minimum inhibitory concentration (MIC) that carried out by using vancomycin, tigecycline and linezolid for 8 isolates, MIC results were1-2 µg /ml, 0.25-0.5 µg /ml, 4 µg /ml, respectively;  4 isolates were selected according to their aggressive antibiotic resistance to test the antibiotics` combinations effects, the combination of vancomycin/ tigecycline presented promising results against S. aureus infections at low concentrations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Fexofenadine Adsorption by Activated Charcoal Impregnated with Hydrogen Peroxide
...Show More Authors

The adsorption of fexofenadine drug by activated charcoal powder impregnated with hydrogen peroxide (IAC) to improve its surface properties was investigated. The investigation also aimed to assess the effect of the repeated dose in increasing the amount of the drug adsorbed. The powder activated charcoal was impregnated with H2O2 3%. The effects of pH of the solution, concentration of the drug and time of the reaction parameters were investigated by using UV-Vis spectroscopy. The IAC was brought in contact with the drug solution in different pH (2, 4, 7 and 9), drug concentrations (30, 60, 90 and 120 µg ml-1) and time (15, 30, 45 and 60 minutes). After each experiment, a repeated dose of IAC was introd

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 13 2020
Journal Name
Journal Of Physics: Conference Series
Chaos in Beddington–DeAngelis food chain model with fear
...Show More Authors
Abstract<p>In the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t</p> ... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 08 2024
Journal Name
Engineering, Technology &amp; Applied Science Research
Making Different Topographic Maps with the Surfer Software Package
...Show More Authors

The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
VCAM-1 Expression in Endometerium with Human Cytomegalovirus Infection
...Show More Authors

Background: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
Glucose Tolerance in Pregnant Women Inflicted with Candida Albicans
...Show More Authors

Background: Many previous studies were concerned with
the relationship between gestational diabetes and the
development of vaginal candidiasis in pregnant women. In
this study, our aim is directed to uncover glucose tolerance
status in non-diabetic pregnant women inflicted with
candida albicans.
Methods: Thirty-four pregnant women with vaginal
condidiasis (as demonstrated by microscopy) were enrolled
in this study. The patients were nearly similar in their
anthropometric and demographic criteria with those of the
healthy pregnant women (control group, forty –two
women). Fasting plasma sugar and glucose tolerance test
were alone for all patients and control group.
Results: fasting plasma sugar was

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF