In order to investigate the presence of methicillin or multidrug resistant Staphylococcus aureus in food-chain especially Cows raw milk and white raw soft cheese and its whey, a total of 30 samples were collected randomly from different markets in Baghdad Province during December 2012 till February 2013, in which samples were analyzed by a standard isolation protocols of food microbiology with some modification processing by new, modern and rapid technology tools such as chromogenic medium Baird-Parker agar, Electronic RapIDTM Staph Plus Code Compendium Panel System (ERIC®) Dryspot Staphytect Plus and Penicillin Binding Protein (PBP2') Plus assays; as well as, studying the susceptibility of isolates to different selected antibiotics. The results profile showed isolation, identification, confirmation and enumeration of 10 (33.4%) isolates of MRSA as 4 (13.4%) isolates from raw milk and 6 (20%) isolates from white raw soft cheese with its whey. These findings suggest presence of MRSA type in locally produced raw milk and soft cheeses in Baghdad markets thus recommended to monitoring these products periodically to inshore public health.
The present investigation is concerned primarily with sorting and identification of subfamily Tubificinae from River Tigris and some water surface in Baghdad /Iraq . For this purpose six study sites were chosen, including a Al- Kadhemyia drainage canal, North Baghdad; three sites on the shore of River Tigris; in addition to site in Al-Jaish canal , East Baghdad, finally the sixth site was from pond in Al-Zawra'a park , within the center of Baghdad .These sites were characterized by sediment rang from clay, silty-clay to silty with a percentage of organic matter ranged between 0.7% - 9.9% . According to water temperature, salinity and pH values, they were nearly identical in all study sites, the water temperature was ranged through the study
... Show MoreThe research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater
... Show MoreThe Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreAbstract
This study aimed to kmow the effect of food on appearance of ovaries cyst in women aged 15-54 year in Baghdad. City and its relation ship with reproductive health Woman samples was divided to four aged groups;15-24 , 25-34 , 35-44 and 45-54 years.
Results demonstrate that all samples of women has varied level of obesity.
Also we are noticed that all samples of women has varied level of obesity.
Also we are noticed tgat is a relation ship between obesity and marriagestatas with the highest proportion of ovarian cystsin obese marriage woman reached to37.90% The percent of un married women which have obesity class // with ovarian cysts reached50% Results refer to found that %19-24 of married women had obortians and