n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and detection of (blaCTX-M-1, blaCTX-M-2, blaCTX-M-8 and blaCTX-M-9) was done by multiplex polymerase chain reaction (PCR). Results showed the presence of blaCTX-M-2 gene, which is responsible for resistance to cefotaxime in these isolates, while no other types of , blaCTX-M genes were found in them
Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Background: Diabetes mellitus type 2 has been known for many years as the most common endocrine metabolic disorder that affect the oral cavity and cause many oral diseases including candidiasis. In this study, the incidence of Candida spp. in the saliva of controlled and uncontrolled diabetic patients were determined and compared with non diabetic group. Material and method: The sample consists of 200 subjects: 100 diabetic patients [57 (28.5%) uncontrolled diabetes, 43 (21.5%) controlled diabetes] and 100 (50%) non diabetic groups. Saliva samples was obtained from the subjects and cultured on selective media using appropriate microbiological method to observe the presence of Candida spp. Results: The results revealed a significant associat
... Show MoreIn this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/
... Show MoreThis study is conducted to identify the microbial content of some types of infant milk formula available in the local markets of the city of Baghdad and their conformity microbial limits sited by the Iraqi standard. Seventy samples were collected from trademarks of imported infant milk formula included of five samples of infant milk formula No (1) and five samples of follow-up formula No (2). These samples were collected randomly from shops in the local markets of Baghdad city on both sides of Karkh and Rusafa included the following kinds: Dialac 1, Dialac 2 ,Celia 1, Celia 2 ,Biomil 1, Biomil 2 , Nactalia 1, Nactalia 2, Novalac 1 , Novalac 2 , Similac 1 , imilac 2 , Guigos 1, Guigos 2. Some microbial tests were done which in
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More