Preferred Language
Articles
/
bsj-528
Detection of Cronobacter sakazakii (Enterobacter sakazakii) in powdered food infants (PIF) and raw milk in Iraq
...Show More Authors

This study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate persence were non-significant (P<0.05). The results of antibioticsusceptibility were determined using Vitek-2GN system; .sakazakii isolates showed 100% resistance to cefazolin and cefoxitin, but were highly sensitive to many antibiotics includes (Imipenem, Meropenem, Amikacin, Gentamicin, Tobramycin, Ciprofloxacin, Levofloxacin, Nitrofurantion, Trimethoprim sulfamethoxazole, Ampicillin, Ampicillin sulbactam, Pipercillin Tazobactam, Ceftazidime, Ceftriaxone, Cefepime Azetreonam and augmentin ). The present study did not determine C.sakazakii in all the samples of PIF that is available in the local markets.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
The Participation of the Students of the Colleges of Education in the Iraqi Universities in Literacy and Adult Education in Iraq. The Students of the Departments of Holy Quran and Islamic Education (A model)
...Show More Authors

The study focuses on the problem that Iraq is approaching an increasing rate of literacy;the available data refers to a rate of (18% -19%). In addition to the fact that the generalcurrent role of the programs directed to literacy is not actually effective enough to limit the expansion of this rate.

The importance of this study highlights the fact that the Iraqi universities are an important tributary among the tributaries of human development, especially in spreading the education of the voluntary work in literacy field and confirming the connection between the students and their society and their role in solving one of the prominent challenges that face the development, i.e., literacy.

<

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Efficacy, safety and Cardiovascular Disease Risk Lowering Ability of ACE Inhibitors, B-Blockers and Combination Antihypertensive Drug Regimes in Iraq
...Show More Authors

Hypertension is a major health problem throughout the world because of its high prevalence and its association with increased risk of cardiovascular diseases. It is defined as systolic blood pressure ≥ 140 mmHg and/or diastolic blood pressure ≥ 90 mmHg. The aim of this study was to compare the efficacy, safety and cardiovascular disease risk lowering ability, of three antihypertensive drug regimens.

A retrospective study was carried out on 66 hypertensive patients, divided in to three groups based on their antihypertensive drug regimens (ACE inhibitors, β-blockers treated and combination antihypertensive therapy, the combination therapy consist of two or more of the following antihypertensive drugs ACE inhibitor di

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 02 2012
Journal Name
Eastern Mediterranean Health Journal
Knowledge, attitude and practice regarding breast cancer and breast self-examination among a sample of the educated population in Iraq
...Show More Authors

This cross-sectional, questionnaire-based study evaluated the knowledge, attitude and practice towards breast cancer and breast self-examination [‎BSE]‎ among 387 [‎302 females and 85 males]‎ educated Iraqis affiliated to 2 Iraqi universities. The participants were categorized into 3 occupations: student [‎71.3%]‎, teaching staff [‎10.3%]‎ and administrative staff [‎18.3%]‎. About half of the participants had a low knowledge score [‎< 50%]‎; only 14.3% were graded as [‎Good]‎ and above. Almost 75% of the participants believed that the best way to control breast cancer was through early detection and other possible preventive measures. Most participants [‎90.9%]‎ had heard of BSE, the main source of informatio

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (38)
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The role of business incubators represented by the banking system in financing small and medium enterprises in Iraq for the period 2000-2010
...Show More Authors

The process of transformation from the central economy to a free economy requires restructuring the economy according to a new economic philosophy that relies on activating the role of private economic activity in which private and medium-sized institutions occupy an essential axis for their active role in the economies of all countries, especially those countries that have directed towards the market mechanism and sector leadership. The special process of economic development and the role that commercial banks can play in advancing the financing of these projects by establishing specialized business incubators for financing.

What encouraged countries to pay attention to these institutions is the ease of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 28 2025
Journal Name
International Linguistics Research
A Pragmatic Analysis of Modality in English Academic Texts in Nigeria and Iraq تحليل تداولي للتصويغية في النصوص الانكليزية في نيجيريا و العراق
...Show More Authors

Despite scholars’ attention on the typology of modality as a linguistic phenomenon, yet the use of modality across varieties of English is not well visible in communication-based researches that take semantics, pragmatics and discourse issues as the objects for their investigation. The paper generates its data from six M. A. dissertations from Nigerian University and equal number of the M. A. dissertations from Iraqi University to qualitatively and quantitatively investigate the contextual use of modality within the pragmatic perspective. The data analysis reveals that modality such as usuality, potentiality, necessity, probability and obligation in the dissertations encapsulates interpersonal and authorial voice in which the mean

... Show More