Urinary tract infections (UTIs) mean microbial pathogens in the urethra or bladder (lower urinary tract). Important risk factors for recurrent UTI include obstruction of the urinary tract, use of a bladder catheter or a suppressed immune system. This study aims to isolate and identify bacteria from patients with TCC-bladder cancer or patients with a negative cystoscope and estimate antibiotic susceptibility patterns and evaluate some of the virulence factors. From a total of 62 patients with TCC-BC or negative cystoscope, only 35 favorable bacterial growths were obtained, including Escherichia coli (UPEC), a significant bacterial isolate, and Stenotrophomonas maltophilia. The percentage of multi drug-resistance bacteria (MDR) was identified in (62.8%) while the extended drug-resistance bacteria (XDR) was (28.5%). All isolates were producer for biofilm either moderately 18/35 (49%) or strongly 18/35 (51%). Only 25/35 (71%) isolates were produced for siderophore, while 10/35 (29%) isolates were non-produced. Inducing cytochrome P450 expression protein was seen in (14/35) 40% isolates. In conclusion, patients with TCC-BC or negative cystoscope who had a urinary catheter or immune-compromised were at high risk of infecting with nosocomial or opportunistic pathogens, which could be develop antibiotic resistance, the central problem in the cohort of patients undergoing chemotherapy or immune cancer therapy
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreAbstract Background: Timely diagnosis of periodontal disease is crucial for restoring healthy periodontal tissue and improving patients’ prognosis. There is a growing interest in using salivary biomarkers as a noninvasive screening tool for periodontal disease. This study aimed to investigate the diagnostic efficacy of two salivary biomarkers, lactate dehydrogenase (LDH) and total protein, for periodontal disease by assessing their sensitivity in relation to clinical periodontal parameters. Furthermore, the study aimed to explore the impact of systemic disease, age, and sex on the accuracy of these biomarkers in the diagnosis of periodontal health. Materials and methods: A total of 145 participants were categorized into three groups based
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show MoreDue to the remarkable progress in photovoltaic technology, enhancing efficiency and minimized the costs have emerged as global challenges for the solar industry. A crucial aspect of this advancement involves the creation of solar cell antireflection coating, which play a significant role in minimizing sunlight reflection on the cell surface. In this study, we report on the optimization of the characteristics of CeO2 films prepared by pulsed laser deposition through the variation of laser energy density. The deposited CeO2 nanostructure films have been used as an effective antireflection coating (ARC) and light-trapping morphology to improve the efficiency of silicon crystalline solar cell. The film’s thickness increases as laser fluence i
... Show MoreCitric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the
... Show More