Pseudomonas aeruginosa is a common and major opportunistic human pathogen, its causes many and dangersinfectious diseases due to death in some timesex: cystic fibrosis , wounds inflammation , burns inflammation , urinary tract infection , other many infections otitis external , Endocarditis , nosocomial infection and also causes other blood infections (Bacteremia). thereforebecomes founding fast and exact identification of P. aeruginosafrom samples culture very important.However, identification of this species may be problematic due to the marked phenotypic variabilitydemonstrated by samples isolates and the presence of other closely related species. To facilitate species identification, we used 16S ribosomal DNA(rRNA) sequence data
... Show MoreObjective: The study aimed to screen the prepubertal children for idiopathic scoliosis at earlier stages, and find
out the relationship between idiopathic scoliosis and demographic data such as age, sex, body mass index,
heavy backpacks, and heart & lung diseases.
Methodology: A descriptive study was conducted on screening program for prepubertal children in primary
schools at Baghdad city, starting from 24th of February to the end of October 2010. Non- probability
(purposive) sample of 510 prepubertal children were chosen from primary schools of both sides of Al-Karkh
and Al-Russafa sectors. Data was collected through a specially constructed questionnaire format include (24)
items multiple choice questions, and
Abstract\
The value chain analysis is main tools to achieve effective and efficient cost management; it requires a depth and comprehensive understanding for all internal and external activities associated with creating value. Supply chain as apart of value chain, that means managing it in active and efficient can achieve great results when adopting a comprehensive and integrated performance for these two chains activities. The research aims to identify possible ways to integrate the performance of value and supply chains of the sample" Kufa-cement plant" and determine the effect of this integration in enhancing customer value. The research arrival that logical and integrated analysis of value and supply chains helps
... Show MoreThe experiment was carried out in the green house of botanical garden belong to Department of Biology/College of Education for Pure Science- Ibn–al- Haitham/University of Baghdad, for the growth season 2015 using plastic pots. The experiment aimed to study the effect of two concentrations of sodium chloride (50, 100) mM.L-1 in addition to the control and four concentrations of kinetin (25, 50, 75, 100) mg.L-1 in addition to the control and the influence of application and non application of fertilizlizer NPKZn in the level 160 kg.h1- and their interactions on some growth parameters (fresh weight for both root and vegetative part, dry weight for leaves , value of secondary productivity, biomass duration for vegetative part and dry weight f
... Show MorePowder extracts hot water from local ground beef and studied inhibitory effectiveness of powder and extracts to the concentration of the aqueous extract hot Gulf students
The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More