Rapid and accurate identification of Methicillin Resistant Staphylococcus aureus is essential in limiting the spread of this bacterium. The aim of study is the detection of Methicillin Resistant Staphylococcus aureus (MRSA) and determining their susceptibility to some antimicrobial agent. A total of fifty clinical Staphylococcus aureus, isolated from the nose of health work staff in surgery unit of Kalar general hospital and from ear of patients attended to the same hospital. The susceptibilities of isolates were determined by the disc diffusion method with oxacillin (1 ?g) and cefoxitin (30 ?g), and by the mannitol salt agar supplemented with cefoxitin (MSA-CFOX), susceptibilities of isolates to other antimicrobial agent were determined by standard disc diffusion method, Brain heart infusion (BHI) agar with vancomycin was used for detection of vancomycin resistant Staphylococcus aureus. out of fifty clinical isolates of Staphylococcus aureus 36/50(72%) considered to be MRSA according to MSA-CFOX growth and cefoxitin disc susceptibility results with critical diameter<27 mm but 35/50(68%) considered to be MRSA when critical diameter ?21 mm was depended, while according to oxacillin disc 29/50(58%) considered to be MRSA, all isolates showed good susceptibility to imipenem (100%) with different pattern of susceptibility to other antibiotics, 4/50(8%) showed non-susceptible to vancomycin and grew on BHI agar with supplemented vancomycin. high percentage of isolates were methicillin resistant and vancomycin reisitance occurs among them which may refer to irrational use of antimicrobial agent, thus, necessitate implementation of good strategies for control of infection and use of antibiotic. and to use of cefoxitin as screening agent for rapid detection of MRSA in microbiology laboratories.
Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreUse Almtafr axis to study the response component that isolates gave a positive response to the use of standard Almtafr which leads to lower the temperature and the number of cells at a temperature suitable Rifampicin resistant less than that TJ and similarly reflected on the frequency of mutations induced
Asphalt Hot Mix (HMA) is mainly applied in highway construction in Iraq because of its economic advantage and easy maintenance. Various factors impact the performance of HMA in the field. It is one of the significant impacts on aggregate gradation. The Universal Specification for Roads and Bridges in Iraq (SCRB) limits the different types of asphalt layers and allows for designed tolerance aggregate gradation. It is quite hard for contractors in the present asphalt industries to achieve the required job mix because of sieves' control problems. This study focuses on the effects on the required specification performance of aggregate deviations by using original and modified asphalt binder with AC(40-50) and
... Show MoreThe time series of statistical methods mission followed in this area analysis method, Figuring certain displayed on a certain period of time and analysis we can identify the pattern and the factors affecting them and use them to predict the future of the phenomenon of values, which helps to develop a way of predicting the development of the economic development of sound
The research aims to select the best model to predict the number of infections with hepatitis Alvairose models using Box - Jenkins non-seasonal forecasting in the future.
Data were collected from the Ministry of Health / Department of Health Statistics for the period (from January 2009 until December 2013) was used
... Show More