Pseudomonas aeruginosa readily binds to different kind of abiotic surfaces and form biofilm. The ability of the bacterial species to form biofilm onto polyvinyl chloride (PVC) is associated with several economic, health and environmental problems. The effect of kind of water on ability of this bacterium to form biofilm is scanty in literature. In present study, the ability of different environmental isolates of P. aeruginosa to form biofilm onto polystyrene microtiter plate was evaluated. Furthermore, the effect of waters that collected from different sources on biofilm formation of this bacterium onto PVC was studied. Spectrophotometric method was used to check the ability of bacteria to form biofilm and evaluated the role of waters onto ability of P. aeruginosa to form biofilm. The current study showed that all environmental isolates of P. aeruginosa had a good ability to form biofilm onto polystyrene microtiter plate. PAE1 showed the maximum ability of biofilm formation onto polystyrene microtiter plate. The water that collected from different places such as well water, river water, sewage water, distilled water, tap water and lake water showed negative effect (P<0.05) on the ability of PAE1 to form biofilm onto polystyrene microtiter plate and PVC as compared to normal saline. From present study, it can be concluded that all isolates of P. aeruginosa that isolated from soil had a good ability to biofilm formation. The waters that collected from different environmental areas affected negatively on ability of P. aeruginosa to form biofilm onto polystyrene and PVC.
Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreBackground: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show MoreThe aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show MoreAbstract:
The study focused on the application of smart tourism as one of the applications of electronic commerce in the form of (B2C) to attract tourists to Saudi Arabia, where the tourism sector is one of the important sectors on which the Kingdom depends on the diversity of its economy.
The purpose of the research: With the issuance of tourist visas for the first time the study noted a deterioration in the case of Saudi tourist sites over the Internet, which do not live up to this great interest by the Saudi government for this sector, which became vital to them. The study tried to identify the reality of the Saudi tourist sites through the Internet in order to identify the sui
... Show MoreThe research seeks to examine the ability of fifth preparatory students in solving a mathematical problem in relation to system thinking. To this end, the researcher chose (140) fifth preparatory students from four-different secondary schools in Kirkuk city for the academic year (2016-2017). Two tests were adopted to collect study data: a test of (5) items about skills in solving math problem designed by (Al-raihan, 2006); and a test of system thinking skills designed by the researcher himself consisted of (14) items. It was divided into four skills (analyzing the main system to subsystems, eliminating all inner gaps of system, identifying the inner connection of system, and reorganizing the system). The findings indicated a good ability
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreFraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro
... Show MoreIn this research, damping properties for composite materials were evaluated using logarithmic decrement method to study the effect of reinforcements on the damping ratio of the epoxy matrix. Three stages of composites were prepared in this research. The first stage included preparing binary blends of epoxy (EP) and different weight percentages of polysulfide rubber (PSR) (0%, 2.5%, 5%, 7.5% and 10%). It was found that the weight percentage 5% of polysulfide was the best percentage, which gives the best mechanical properties for the blend matrix. The advantage of this blend matrix is that; it mediates between the brittle properties of epoxy and the flexible properties of a blend matrix with the highest percentage of PSR. The second stage
... Show More