P. aeruginosa is one of the complex targets for antimicrobial chemotherapy. Also, it is intrinsically resistant to several antibiotics. It produces β-lactamases enzymes that are responsible for the widespread β-lactam antimicrobial resistance. There are three major groups of β-lactamase enzymes, MBLs and ESBLs forming Pseudomonas is a major issue for the treatment of burns victims. Methods: A total of 28 clinical isolates related to P. aeruginosa have been obtained from the burns specimens from patients attending to AL-Imam hospital/Baghdad-Iraq, through the period from October 2015 to March 2016. Also, all isolates have been recognized as P. aeruginosa via utilizing bacteriological assay and confirmed by Vitek 2. In addition, the susceptibility regarding P. aeruginosa isolates towards many antibiotics is identified detected. Results: it was found that the susceptibility regarding P. aeruginosa isolates towards ceftazidime and cefotaxime respectively is (75%) and (71.4%), while P. aeruginosa isolates’ susceptibility towards imipenem was (67.9%). Extended-spectrum β-lactamases producing Pseudomonas was (30 %) while metallo β-lactamases producing P. aeruginosa was (78.9 %) by double-disk synergy test, in general, the percentage of P. aeruginosa producing ESBL and MBL was (11.1%). Production of EXBLs and MBLs was determined to be plasmid-mediated that could be eliminated by using UV light as a curing agent. Conclusion: The importance of MBL and ESBL forming P. aeruginosa as evidence of increasing resistance to the antimicrobial agent; especially penicillins and cephalosporins as a drug of choice, also it was noticed that P. aeruginosa have the ability to produce MBLs more than ESBL; and these enzymes producing genes are harbored on a plasmid that can be affected by curing chemical agent
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreEpithelial ovarian cancer is the leading cause of cancer deaths in women. To date, an effective screening tool for ovarian cancer has not been identified Several clinical and biological factors including serum cancer antigen 125 (CA- 125) have been assessed for prognostic and predictive relevance CA-125 is an epithelial marker derived from coelomic epithelium. It is elevated in 90% of advanced ovarian cancers and in 50% of early ovarian cancers while 20% of ovarian cancers have low or no expression of CA- 125 CA-125 concentrations were measured by Mini Vidas test (VIDAS CA125 II / BIOMERIEUX / France). The median CA-125 levels were significantly higher in the sera of ovarian cancer patients than in those with benign tumors an
... Show MoreG-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R
... Show MoreThis investigation was designed to determine the occurrence of intestinal parasites in fresh
vegetables(Apium graveolense, Lepidium aucheri and Allium porrum), from different markets
as a primary effort in Iraq. Eight genera and species of intestinal parasites appear in
vegetables, they were as follow: Echinococcus sp. 50%,Oxyuris equi 45%,Habronema sp.
45%,Parascaris equroum 31.6%,Strongyloides westrei 30%,Toxocara sp. 18.3%,Ascaris
lumbricoides 11.6% and Hymenolepis sp. 8.3% .The scarcity of fresh water has meant that
urban gardeners are increasingly irrigating their plots with wastewater. This poses a threat to
public health in addition of roaming dogs in open farms. All studied areas showed high rates
of eggs
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show More