Background: Klebsiella pneumoniae were considered as normal flora of skin, and intestine. It can cause damage to human lungs; the danger of this bacterium is related to exposure to the hospital surroundings. materials and methods: the detection of Klebsiella pneumoniae on morphological and biochemical tests and then assured with VITEK 2 system. Resistance to antibiotics was determined by Kirby-Baeur method. And genotyping of IMP-1 in isolates was done by PCR technique, then biofilm formation was identified by Micro titer plate method. Results: The present study included a collecting of 50 specimens from different clinical specimens, (blood 40%, urine 30%, sputum 20%, wound infection 10%); 10 isolates were identified as Klebsiella pneumoniae . All isolates, under study, developed high resistance toward Cefitrixon, Ampicillin, Amoxicillin, Ticarcillin, Ticarcillin+Clavulanic acid, and Ceftazidim estimated by disc diffusion method. All isolates characterized by harboring the highest resistant in a percentage reached 100% against antibiotics, under study. This study determined the Minimal Inhibitory Concentration were detected by eight E-test strips for isolates. As well as the isolates were strong biofilm production for three isolates, while three were moderate of biofilm formation and other isolates were weak former; at the value of (P≤0.05) was considered as a significant. Genotype detection of Metalo-beta lactamase (IMP-1) by PCR technique in Klebsiella pneumoniae . Upon using PCR technique exposed only three isolates;30% of isolates (two from urine, one from blood) samples harbored IMP-1 gene. The study was also found relationship between IMP-1 and biofilm formation in isolates which were harboring these genes, when (P ≤ 0.05). Conclusions: K. pneumoniae were isolated from different sources. All isolates were resistant to most antibiotics used in this study. The isolates have Metallo-beta lactamse. PCR was showed K. pneumoniae have IMP-1 gene,.This study also found there was relationship between biofilm formation and IMP-1 gene in K. pneumoniae (P≤0.05).
Background: Various studies conducted in many parts of the world suggest that there is lack of public awareness and knowledge of various aspects related to diabetes. With proper education, awareness, earlier detection and better care, many complications and co-morbidities can be reduced in diabetic population.Objectives: to evaluate the level of awareness of diabetes mellitus type 2 patients regarding their disease and its' complications.Methods: Cross – sectional survey was conducted during November and December 2011, in the Medical centers of Al Baladiat, Mustansyria and Zuafranya, including 145 type 2 diabetic patients (58.6 % males, 41.4% females) who were subjected to self–structured questionnaires regarding different aspects of
... Show MoreThis research discusses the subject of emotional stimulation factors through the stages of product design interaction with the consumer and what they reflect in the formation of a self-consideration of the design in his emotional memory regarding the specific brand through the following question (What is the emotional stimulus in the design of certain products and its reflection on the consumer during the processes of receiving and using it?), The importance of the research comes in the connection of design elements with many sensory factors used and motivating to attract the consumer to the acquisition of a specific design and the demand for its experience, the study aims Detection and access to emotional stimulation in the design of th
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThis work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show More