Rapid and accurate identification of Methicillin Resistant Staphylococcus aureus is essential in limiting the spread of this bacterium. The aim of study is the detection of Methicillin Resistant Staphylococcus aureus (MRSA) and determining their susceptibility to some antimicrobial agent. A total of fifty clinical Staphylococcus aureus, isolated from the nose of health work staff in surgery unit of Kalar general hospital and from ear of patients attended to the same hospital. The susceptibilities of isolates were determined by the disc diffusion method with oxacillin (1 ?g) and cefoxitin (30 ?g), and by the mannitol salt agar supplemented with cefoxitin (MSA-CFOX), susceptibilities of isolates to other antimicrobial agent were determined by standard disc diffusion method, Brain heart infusion (BHI) agar with vancomycin was used for detection of vancomycin resistant Staphylococcus aureus. out of fifty clinical isolates of Staphylococcus aureus 36/50(72%) considered to be MRSA according to MSA-CFOX growth and cefoxitin disc susceptibility results with critical diameter<27 mm but 35/50(68%) considered to be MRSA when critical diameter ?21 mm was depended, while according to oxacillin disc 29/50(58%) considered to be MRSA, all isolates showed good susceptibility to imipenem (100%) with different pattern of susceptibility to other antibiotics, 4/50(8%) showed non-susceptible to vancomycin and grew on BHI agar with supplemented vancomycin. high percentage of isolates were methicillin resistant and vancomycin reisitance occurs among them which may refer to irrational use of antimicrobial agent, thus, necessitate implementation of good strategies for control of infection and use of antibiotic. and to use of cefoxitin as screening agent for rapid detection of MRSA in microbiology laboratories.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More