The current study is the identification and isolation dermatophyte species in clinical isolates by both Sabouraud’s Dextrose Agar (SDA) and on Dermatophyte Test Medium (DTM). Clinical specimens of hair, nails and skin scales were collected from patients with dermatophytosis and submitted to direct microscopic examination after immersion in 20% of potassium hydroxide solution. The clinical specimens were cultured on SDA containing chloramphenicol and cycloheximide, and on DTM. Tinea corporis showed the highest prevalent dermatophyte infection among patients (26.7%), followed by Tinea pedis (23.3%), whereas Tinea manuum exhibited the lowest fungal infection (6.7 %). Rural areas revealed the highest prevalence of dermatophyte in
... Show MoreIn this paper was discussed the process of compounding two distributions using new compounding procedure which is connect a number of life time distributions ( continuous distribution ) where is the number of these distributions represent random variable distributed according to one of the discrete random distributions . Based on this procedure have been compounding zero – truncated poisson distribution with weibell distribution to produce new life time distribution having three parameter , Advantage of that failure rate function having many cases ( increasing , dicreasing , unimodal , bathtube) , and study the resulting distribution properties such as : expectation , variance , comulative function , reliability function and fa
... Show MoreIn this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum
... Show Morerop simulation models play a pivotal role in evaluating irrigation management strategies to improve water use in agriculture. The aim of this study is to verify the validity of the Aquacrop model of maize under the surface and sprinkler irrigation systems, and a cultivation system, borders and furrows, and for two varieties of Maze (Fajr and Drakma) At two different sites in Iraq, Babylon and Al-Qadisiyah governorates. An experiment was conducted to evaluate the performance of the Aquacrop model in simulating canopy cover (CC), biomass (B), dry yield, harvest index (HI), and water productivity (WP). The results of RMSE, R2, MAE, d, NSE, CC, Pe indicated good results and high compatibility between measured and simulated values. The highest a
... Show MoreOrthodontic tooth movement is characterized by tissue reactions, which consist of an inflammatory response in periodontal ligament and followed by bone remodeling in the periodontium depending on the forces applied. These processes trigger the secretion of various proteins and enzymes into the saliva. The purpose of this study was to evaluate the activity of the lactate dehydrogenase (LDH) in saliva during orthodontic tooth movement using different magnitude of continuous orthodontic forces. Thirty orthodontic patients (12 males and 18 females) with ages 17-23 years with class II division I malocclusion all requiring bilateral maxillary first premolar extractions. Those patients were randomly divided into 3 groups according to the magnitude
... Show MoreThe research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c
... Show MoreThis study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (
... Show MoreThis research presents an experimental investigation on the influence of metakaolin replacement percentage upon some properties of different concrete types. Three types of concrete were adopted (self- compacted concrete, high performance concrete and reactive powder concrete) all of high sulphate (SO3) percentage from the fine aggregate weight, 0.75%. Three percentages of metakaolin replacement were selected to be studied (5, 7 and 10) %. Three types of concrete properties (compressive, flexural and splitting tensile strength) were adopted to achieve better understanding for the influence of adding metakaolin.. The output results indicated that the percentage of metakaolin had a different level of positive effect on the compressive strength
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More