The bacterial contamination of lipsticks and face cream may become a great important matter in the medical laboratories. The present study was designed to determine the types of bacterial contamination in the face cream and lipsticks of undergraduate students. Also, the study aimed to determine the sensitivity of the isolated bacteria against many antibacterial agents. The study included 190 swabs samples from 190 face cream and lipsticks samples of the females’ students from five departments in the Medical Technology Institute, Almansour, Middle Technical University were collected in February 2018. The swab samples were collected with sterile condition and cultured on enriched Blood agar and MacConkey agar. Serial dilutions were made up to 10−6 to enumerate the suspected present bacteria in the samples. The identification of isolated bacteria was confirmed by using culture media, Gram stain and biochemical tests. The sensitivity test of the isolated bacteria to different antibiotics was examined according to Bauer - Kirby disc diffusion method. 100 (52.63%) samples were positive; 100 isolates of bacteria were isolated from makeup. Also, the percentage of bacterial isolates isolated from the face cream samples were more than the lipsticks (85% vs. 15%, respectively). The most frequent bacterial isolates were Staphylococcus aureus (66.66% from lipstick swabs and 47.05% from the face cream) followed by Staphylococcus epidermidis (13.33 from the lipstick and 23.52% from the face cream). Also, Escherichia coli was isolated and the percentage of E. coli was 13.33% and 11.76%, for the lipstick and the face cream, respectively. Pseudomonas aeruginosa showed a high resistance to the antibiotics. Whereas, Staphylococcus aureus, Staphylococcus epidermidis, Escherichia coli, Streptococcus pyogenes, Bacillus subtilis, Micrococcus spp. and Proteus mirabilis were susceptible to Cephalothin and Ciprofloxacin, while it resistant to Amikacin, Cefazolin and Cefotaxime. The bacterial counts in the makeup were higher than the bacterial limits standards. The lipstick and face cream were relatively contaminated with Gram-positive and Gram-negative bacteria more than the standard limit, these contaminated accessories lead to distribute the pathogenic bacteria among the students causing several diseases.
The present study was conducted on spring-fed(Abdullah Abu-Nadjem Oasis)west of AlDewanyah province,Iraq. ,during Winter 2007. The results indicate that water quality was neutral tend to be slightly alkaline pH was 7.7 and 7.4 for station(1)and station (2) respectively. Total hardness value of water about 1520 and 1488 mg/l.for two stations respectively ,This high values of hardness may be due to Calcium ions 397.5 and 395.5mg/l.for two stations. According to Salinity values (1.58 - 2.22) ‰(ppt) ,water of oasis may be classified as brackish water, the oasis water was well aerated dissolved oxygen was 5.3 and 7.4 mg/l. On the other hand about (58) algal taxa were recorded
... Show MorePost-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreThis research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor
... Show More