Preferred Language
Articles
/
uhiU4ZQBVTCNdQwCNSG1
Novel isolation and optimization of anti-MRSA bacteriophages using plaque-based biokinetic methods
...Show More Authors

Background: MRSA (methicillin-resistant Staphylococcus aureus) is a global health problem. Many people are looking for new ways to combat MRSA, for example by using bacteriophages (phages). It has been extremely challenging to isolate a sufficient quantity of lytic anti-MRSA phages. Therefore, new techniques for separating, refining, and reworking anti-MRSA phages were sought in this study.

Methods: Of 437 S. aureus isolates, nine clinical MRSA isolates were obtained from three hospitals in Baghdad, Iraq and two ATCC MRSA strains were used to separate wild anti-MRSA phages from sewage, filth, and hospital settings. The wild phage was optimized using plaque-based biokinetic methods. The resulting highly lytic and specific anti-MRSA phages were subjected to novel physico-chemical phage redesign protocols using agents to weaken the bacterial cell wall to allow phages to enter into host bacteria and acquire the specificity of the new host. Three protocols were tested using different combinations of benzethonium chloride (BZT-CH), alkaline ethanol, and chlorhexidine gluconate.

Results: Five newly redesigned, transiently stable, anti-MRSA phages were produced using the BZT-CH and ethanol–alkali methods, albeit at varying rates.

Conclusion: Although the resulting designed anti-MRSA phages are transiently stable, they represent a rare opportunity and an excellent endless source of lytic anti-MRSA phages from which a large number of permanent phage lysins can be separated and purified.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Optical Images Fusion Based on Linear Interpolation Methods
...Show More Authors

Merging images is one of the most important technologies in remote sensing applications and geographic information systems. In this study, a simulation process using a camera for fused images by using resizing image for interpolation methods (nearest, bilinear and bicubic). Statistical techniques have been used as an efficient merging technique in the images integration process employing different models namely Local Mean Matching (LMM) and Regression Variable Substitution (RVS), and apply spatial frequency techniques include high pass filter additive method (HPFA).  Thus, in the current research, statistical measures have been used to check the quality of the merged images. This has been carried out by calculating the correlation a

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
J. Pharm. Sci. & Res.
Comparative study between pure bacterocin and vancomycin on biofilms of MRSA isolated from medical implants
...Show More Authors

Thirty swabes of medical implants were collected from Al-Yarmouk's hospital which were cultured on manitole agar to isolate Staphelococcus aureus . Only four samples gave positive results with this media. It was used ten types of antibiotics to test the sensitivity of this bacterium against them. All isolates of S. aureus were recorded as multidrug resistant and were considered as MRSA. One pledge alternative therapy is the utilize of certain pure bacterocin MIC (32.5 to 62.5 μg/ml) and it was compared with vancomycin (200-400 μg/ml) with average of (8 – 15) mm diameter of inhibition zones recpectively. The first reduction of biofilm formation ability has been proved in catheters when treatedby pure bacterocin. The test shows the highes

... Show More
Scopus (2)
Scopus
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Optimization of Dye Removal Using Waste Natural Material and Polymer Particles
...Show More Authors

In this paper waste natural material (date seed) and polymer particles(UF) were used for investigation of  removal dye of the potassium permanganate. Also study effect some variables such as pH, dye concentration and adsorbent concentration on dye removal. 15 experimental runs were done using  the itemized conditions designed established on the Box-Wilson design employed to optimize dye removal. The optimum conditions for the dye removal were found: (pH) 12, (dye con.) 2.38 ppm, (adsorbant con.) 0.0816 gm for date seed with 95.22% removal and for UF (pH) 12, (dye con.) 18 ppm, (adsorbant con.) 0.2235 gm with 91.43%. The value of R-square was 85.47%  for Date seed  and (88.77%) for UF.

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Generating dynamic S-BOX based on Particle Swarm Optimization and Chaos Theory for AES
...Show More Authors

Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm  in order to remove these weakness points, Will be generated dynamic substitution box (S-B

... Show More
View Publication Preview PDF