Listeria spp. is one of the abortion causative agents in animals, especially in ruminants. This work aimed to detect Listeria spp. in milk and aborted fetus cows in Iraq. A total of 50 organ samples from aborted cow fetuses, including (brain, liver, and spleen), and 50 milk samples from the same aborted cows were collected from Baghdad farms, Iraq from (October 2023- March 2024). The bacteria were identified by conventional culture methods, biochemical tests, and the VITEK2 compact system, followed by molecular confirmation. The antimicrobial resistance pattern assay was performed using the disc diffusion method against eight antibiotic agents, and the L.monocytogenes virulence genes involving prfA,actA, and hylA genes were detected using the PCR. The results revealed that only L. monocytogenes was detected at 2/50(4%) from aborted fetuses isolated from the brain and liver, while not in milk samples. The L.monocytogenes showed 100% resistance against erythromycin, ampicillin, cotrimoxazole, chloramphenicol, vancomycin, and tetracycline. At the same time, all the isolates had a high MDR and MAR (Multiple Antibiotic Resistance) index. This study concluded that L.monocytogenes is one of the abortion causative agents in cattle in Iraq, and the high antibiotic resistance of Listeria leads to economic loss and a possible risk to humans.
The research discusses the formal transformation in urban structure, all the cities around the world have undergone a series of formal transformations, resulting in radical transformations to their functions. And to calculate this transformation the descriptive analytical method was applied to this research. First, local urban management data and Landsat-9 visual data were used after processing by GIS. Then, the data were processed mathematically based on their engineering sequences. The aims of this research were as follows: to explore the formal transformations in cities, their dimensions and their consequences and impacts; to identify the underlying causes of their occurrence by deriving realistic results from trends in such degrees of t
... Show MoreIn this research, the performance of a two kind of membrane was examined to recovering the nutrients (protein and lactose) from the whey produced by the soft cheese industry in the General Company for Food Products inAbo-ghraab.Wheyare treated in two stages, the first including press whey into micron filter made of poly vinylidene difluoride (PVDF) standard plate type 800 kilo dalton, The membrane separates the whey to permeate which represent is the main nutrients and to remove the fat and microorganisms.The second stage is to isolate the protein by using ultra filter made of polyethylsulphone(PES)type plate with a measurement of 10,60 kilo dalton and the recovery of lactose in the form of permeate.
The results showed that the percen
The present study aimed to identify the therapeutic evaluation of chitosan extracted from the fungus cushroom and pure chitosan on glucose and lipid profile in the blood of 35 male rabbits with hyperlipidemia induced experimentally by cholesterol. The tests included estimation of glucose levels, total cholesterol, triglycerides, high-density lipoproteins, low-density lipoproteins, and very low-density lipoproteins. hyperlipidemia was induced in the male rabbits used in the study which was administered orally with cholesterol 150mg/kg body weight for a week. rabbits were divided into seven groups: control, cholesterol, pure chitosan, mushroom chitosan, cholesterol and pure chitosan, cholesterol and mushroom chitosan and cholestero
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More