The control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastewater in Abu Nuwas) from February-July 2021. Out of 67 isolates of bacteria, only 40 isolates of E. coli were detected by Vitek2. The antibiotic-resistance was estimated by the disk diffusion method. All E.coli isolates were tested against 6 antibiotics. The results showed the high resistance antibiotic of E. coli against Ceftazidime 70%, with intermediate resistance to Cefotaxime 47.5%, and low resistance to the sulfa drugs as Trimethoprim 27.5% and quinolones antibiotics as ciprofloxacin 17.5%, aminoglycosides as Amikacin and Gentamycin 5% and 7.5%. Moreover, the results revealed that gyrA gene was detected in 4 isolates (10%) while drf1 and drf17 genes were in 2 isolates of each gene (5%).Whereas qepA gene has not appeared in isolates. In conclusion, the isolates of E.coli from the Tigris River showed low resistance to sulfa drugs and quinolones , aminoglycosides. The resistance genes (gyrA,drf1,drf17) were detected in a few isolates which may be explained by the horizontal transfer of plasmids that carried genes and their distribution among the family Enterobacteriaceae.
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreThe subject of the strategic vision is of great importance to all companies because they live in an environment of rapid change in various areas of life. Supports the performance of its operations in a better way, towards appropriate strategic growth and achieving success. The research aims to determine the level of interest of the researched company in the research variables (strategic vision and growth strategy), and the importance of the research came in being an attempt to provide the theoretical and scientific foundations for the research variables (strategic vision and growth strategy). As for the research method, it was relied on the descriptive analytical method, relying on the questionnaire as a means of obtaining data from the
... Show MoreThe escalating development of technology is one of the distinctive features of the communication environment in the field of sending and receiving satellite broadcasts of television channels in general and Iraqi satellite channels in particular, which contributed to the wide and rapid spread and reaching outside the drawn boundaries and bypassing even natural obstacles, and what is important in this is the communication content that these broadcasts Channels and its impact on the recipient due to the media, cultural, educational and entertainment content it provides, and in our research we will analyze the communication content of the Iraqi satellite channel by choosing one of its dialogue programs that coincided with the events of the l
... Show MoreMost of World nations are striving to provide the necessary needs to protect their economic properties assets against natural or abnormal disasters that may be inflicted on such property and the means that used by such countries to reduce the damages is insurance, whereas insurance as a system that collects and distributes different risks into the group thus to achieve a social symbiosis between individuals. The system works to transfer the risks from the individual to the group and then distributes the losses to all members of the group.
According to the importance of the insurance sector and the need to develop it as well as working on improving its performance, this search aims to identify the ac
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAim of the study is to find any correlation between obesity (insulin resistance) and type I diabetes in children. Obesity and diabetes mellitus are the common health problems, and obesity is common cause of the insulin resistance. The results revealed marked increased in glucose, insulin, HbAlc and insulin resistance in obese diabetic type I patients comparing to control group they were obese and non-obese found to be within normal values for glucose, insulin, FIbAlc , and insulin resistance.
Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use
... Show MoreThe organizational integration forms a necessity according to McKinsey model, especially for service organizations. In the context of various service sector developments, importance adoption of compact mechanisms by these organizations to upgrade their services has increased and senior management must be more aware of environmental, competitive and developmental requirements. It gets more important when it shows in an organization seeking at excellence of making services within its policies and strategies. Subject organizational integration dimensions (strategy, structure, systems, style, staff, shared values, and skills) are effective components in directing behaviors of employees and organization. This motivated both researcher
... Show MoreAbstract
Performance evaluation is of great importance in all countries of the world, because it has a prominent and effective role in determining the efficiency and effectiveness of the optimal use of available resources, which are rare and important in achieving the desired objectives. With the continued growth of public spending and the limited resources, the State seeks to achieve its objectives through its units with minimal expenditure or deficit, rationality and wastefulness in the spending. In many countries, particularly developing countries, reforms are made in the public sector to achieve that goal through the adoption of IPSAS, which is reflected in the developmen
... Show More