The aim of this study was the discrimination of Salmonella isolated from chicken and their feed and drinking water for the epidemiological control of salmonellosis. Totally, 289 samples, including 217 chicken cloaca swabs, 46 water, and 26 feed samples were collected from five different farms in Karbala governorate, Iraq. Conventional bacteriology tests, API 20E, Vitek 2, and serology were used for bacterial identification. Random amplified polymorphic DNA (RAPD)-polymerase chain reaction (PCR) was applied to analyze the genetic relationships among Salmonella isolates. The isolation rate of Salmonella spp. was 21.1% (61/289). While the water samples constituted the highest rate (30.4%), a rate of 21.7% was reported for the cloaca swabs, with no isolate at all from chicken feed. Vitek 2 was able to identify some isolates to the serotype level, such as S. Enteritidis, S. Paratyphi B, and S. Paratyphi C. However, the isolates were diagnosed as S. enterica by API 20E, and as S. enterica subsp. arizonae through serology. Analyzing the samples by the RAPD-PCR assay showed the presence of genetically different Salmonella spp. Dendrograms created by the GelJ software successfully delineated the genetic relationships. Therefore, RAPD-PCR can be used as a surrogate tool for the fast, reliable, and accurate detection of Salmonella in epidemiological surveys when compared with other biochemical-based identification methods.
Background Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.
Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.
Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreThe research deals with an important detail of the joints of the film industry and television drama, which is the expression and aesthetic of the long shot, after being popularized by some directors, and that the long shot has been employed since the beginning of the cinema. But the research addresses the contemporary film and how the long shot worked. The researcher identified her goal in identifying the aesthetic and expressive of the long shot in the contemporary film, and then defined the term of the shot and the long shot.
The theoretical framework was based on two topics: the first (aesthetic and artistic expression in cinema) and the second (the long shot and the state of its construction). The researcher then chose LA LA LAND
ZM Al-Bahrani, Medico Legal Update, 2021
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreMindfulness is considered a process to draw an image of the active event and to creat new social varieties which leaves the individuals open to modernity and to be sensitive towards the context. in contrast, when individuals act with less attention, they need to be more determined concerning the varieties and events of the past . and as a result , they become unaware of the characteristics that creat the individual condition .The problem of the current study is represented in asking about the nature of the possible relationship between mindfulness and self-regulated learning within specific demographic frame of an importantsocial category represented in university students where no previous researches nor theories have agreed on the natu
... Show MoreRouting is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. In literature, routing protocols in VANET were categorized in many ways, according to different aspects. In the present study, we prefer the classification based on the number of hops to reach the destination node. In literature, these are single-hop and multi-hops protocols. We first discuss the two types and then compare the MDDV (multi-hops protocol) with VADD (single-hop protocol). The comparison is theoretically and experimentally implemented by providing a network environment consisting of SUMO, VIENS and
... Show MoreSelf-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t
... Show MoreThis research aims to shed light on the geography of Shatt Al-Gharraf, one of the main branches of the Tigris River south of the sedimentary plain, where the changes exposed by this Shatt (river) were followed by a set of old and modern maps, which date back to the years(3000 BC, 1771 AD, 1810 AD, 1944 AD, 1959 AD, 2009 AD, 2017 AD).Through this research, Shatt al-Gharrafwas found to be an integrated river in terms of the geomorphological phenomena of the rivers (river meanders, river islands, marshes, and estuary). Besides, it was exposed to several changes especially itsdownstream in the Euphrates. It was previously flowing into the Euphrates but due to a number of factors such as the shortage of water in the Tigris River in recent yea
... Show More