Preferred Language
Articles
/
bsj-4124
Detection of CTX-M-type ESBLs from Escherichia coli Clinical Isolates from a Tertiary Hospital, Malaysia
...Show More Authors

The present study aims to detect CTX-M-type ESBL from Escherichia coli clinical isolates and to analyze their antibotic susceptibility patterns. One hundred of E. coli isolates were collected from different clinical samples from a tertiary hospital. ESBL positivity was determined by the disk diffusion method. PCR used for amplification of CTX-M-type ESBL produced by E. coli. Out of 100 E. coli isolates, twenty-four isolates (24%) were ESBL-producers. E. coli isolated from pus was the most frequent clinical specimen that produced ESBL (41.66%) followed by urine (34.21%), respiratory (22.23%), and blood (19.05%).  After PCR amplification of these 24 isolates, 10 (41.66%) isolates were found to possess CTX-M genes. The CTX-M type ESBL producing E. coli against antibiotics belonging to different families showed the highest resistance rates to Ampicillin (100%), Cefotaxime (97%), Cefuroxime (95%), and Ciprofoxacin (86%). Carbapenem groups of antibiotics, Meropenem (89%) and Imipenem (85%) have the highest susceptibility rate among all antibiotics used in this study. The outcome of the antimicrobial susceptibility testing of significant CTX-M- type ESBL producing E. coli could be useful to avoid failure or prolong treatments.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF