One hundred and eighty five urine samples were collected eight isolates (4.3%) were obtained and diagnosed as Staphylococcus aureus. Among 8 isolates, 5 (62.5%) S. aureus isolates were found to be enterotoxigenic, most of isolates produced at least two types of Staphylococcal enterotoxins (SEs). The production of enterotoxins in the presence or absence of Thymol extracts (aqueous and alcoholic) were estimated using a reversed passive latex agglutination (SET-RPLA) kit. The extracts reduced enterotoxin production compared with the control. Enterotoxin inhibition was observed for enterotoxin C production at minimal inhibitory concentrations (MIC) at 400 µg/ml, whereas production of enterotoxins A, B, and D were totally eliminated at (MIC) 800 µg/ml. The results show that the aqueous and alcoholic extracts from the leaves of Thymol decreased the production of SEs by S. aureus.
Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Let M be ,-ring and X be ,M-module, Bresar and Vukman studied orthogonal
derivations on semiprime rings. Ashraf and Jamal defined the orthogonal derivations
on -rings M. This research defines and studies the concepts of orthogonal
derivation and orthogonal generalized derivations on ,M -Module X and introduces
the relation between the products of generalized derivations and orthogonality on
,M -module.
The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
Let R be a commutative ring with identity and let M be a unital left Rmodule.
Goodearl introduced the following concept :A submodule A of an R –
module M is an y – closed submodule of M if is nonsingular.In this paper we
introduced an y – closed injective modules andchain condition on y – closed
submodules.
In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.
Urban wetlands are one of the complex systems that provide many economic, social and environmental services to the city. In this research, the most important services provided by urban wetlands from the point of view of the urban planner were reviewed, and the types of these lands and their divisions according to the type of services provided by each type were presented. Environmental is represented in its ability to reduce the dangers of floods, mitigate the climate and reduce its negative impacts, purify water and deplete a lot of suspended impurities and pollutants, and social services such as recreational areas and beautiful landscapes that inspire joy and reassurance in the soul, as well as cultural areas and sports activities for m
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR