Preferred Language
Articles
/
ijs-7030
Detection of mexB Multidrug Efflux Gene in Some Local Isolates of Pseudomonas aeruginosa
...Show More Authors

      According to the prevalence of multidrug resistance bacteria, especially Pseudomonas aeruginosa, in which the essential mechanism of drug resistance is the ability to possess an efflux pump by which extrusion of antimicrobial agents usually occurs, this study aims to detect the presence of mexB multidrug efflux gene in some local isolates of this bacteria that show resistance towards three antibiotics, out of five. Sensitivity test to antibiotics was performed on all isolates by using meropenem (10µg/disc), imipenem (10µg/disc), amikacin (30 μg/disc), ciprofloxacin (5µg/disc) and ceftazidime (30 µg/disc). Conventional PCR results showed the presence of mexB gene (244bp) in four isolates out of ten (40%). In addition,25, 50μg/ml of curcumin was used to detect its efficacy with the antibiotics that the bacteria showed resistance towards. Results showed the highest resistance for ciprofloxacin (80%), while all of them were sensitive to imipenem. In addition, the present results show that both concentrations of curcumin (25, 50μg/ml) were effective in increasing the zone of inhibition from zero to 10 mm for isolates towards amikacin. Same result was obtained towards ciprofloxacin, except for an increase of inhibition zone from zero to 7 mm to one isolate (38T) when treated with 50 μg/ml, and finally an increase in sensitivity to ceftazidime was found and inhibition zone was increased from 8 to 11 for the second isolate (42E), which revealed that curcumin potentiates antibiotics activity by inhibition of efflux pump mechanisms that can be related to the synergetic activity between antibiotics and curcumin.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Auto Crop and Recognition for Document Detection Based on its Contents
...Show More Authors

An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification. 

View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Hurst Exponent and Tsallis Entropy Markers for Epileptic Detection from Children
...Show More Authors

The aim of the present study was to distinguish between healthy children and those with epilepsy by electroencephalography (EEG). Two biomarkers including Hurst exponents (H) and Tsallis entropy (TE) were used to investigate the background activity of EEG of 10 healthy children and 10 with epilepsy. EEG artifacts were removed using Savitzky-Golay (SG) filter. As it hypothesize, there was a significant changes in irregularity and complexity in epileptic EEG in comparison with healthy control subjects using t-test (p< 0.05). The increasing in complexity changes were observed in H and TE results of epileptic subjects make them suggested EEG biomarker associated with epilepsy and a reliable tool for detection and identification of this di

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design The Modified Multi Practical Swarm Optimization To Enhance Fraud Detection
...Show More Authors

     Financial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
An Effective Hybrid Deep Neural Network for Arabic Fake News Detection
...Show More Authors

Recently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
A Multi-Objective Evolutionary Algorithm based Feature Selection for Intrusion Detection
...Show More Authors

Nowad ays, with the development of internet communication that provides many facilities to the user leads in turn to growing unauthorized access. As a result, intrusion detection system (IDS) becomes necessary to provide a high level of security for huge amount of information transferred in the network to protect them from threats. One of the main challenges for IDS is the high dimensionality of the feature space and how the relevant features to distinguish the normal network traffic from attack network are selected. In this paper, multi-objective evolutionary algorithm with decomposition (MOEA/D) and MOEA/D with the injection of a proposed local search operator are adopted to solve the Multi-objective optimization (MOO) followed by Naï

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
SMS Spam Detection Using Multiple Linear Regression and Extreme Learning Machines
...Show More Authors

     With the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper,  presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Double Function Random Early Detection (DFRED): A Revised RED-Oriented Algorithm
...Show More Authors

     Dropping packets with a linear function between two configured queue thresholds in Random Early Detection (RED) model is incapable of yielding satisfactory network performance. In this article, a new enhanced and effective active queue management algorithm, termed Double Function RED (DFRED in short) is developed to further curtail network delay. Specifically, DFRED algorithm amends the packet dropping probability approach of RED by dividing it into two sub-segments. The first and second partitions utilizes and implements a quadratic and linear increase respectively in the packet dropping probability computation to distinguish between two traffic loads: low and high. The ns-3 simulation performance evaluations clearly indicate t

... Show More
View Publication Preview PDF
Scopus Crossref