Atotal of 75 different clinical samples were collected from different hospitals in Baghdad Biochemical and morphological characterization tests showed that forty isolates were identified as Staphylococcus aureus Antibiotic susceptibility tests of all isolates towards ten antibiotics were carried out and results showed that many isolates (97.5 %) were resistant to ?-lactam antibiotic , 70 % were resistant to Tetracyclinee , 62.5% were resistant to co-trimoxazole , 60 % were resistant to ciprofloxacin , 55% were resistant both of chloramphenicol and erythromycin , 52.5% were resistant to gentamicin , 35% were resistant to rifampicin , 10% were resistant to vancomycin . According to the above results the S.aureus I1 which is isolated from patients with osteomyelitis showed resistant to all ten antibiotics therefore was used in the followed experiments. The minimum inhibitory concentration (MIC) of S.aureus I1 vancomycin, cefotaxim , penicillin G, amoxicillin , ciprofloxacin , co-trimoxazole ,gentamicin, rifampicin was checked.The results showed that isolates had MIC between (390-12500) ?g/ml. The combination of different antibiotics with vancomycin showed synergistic effect based on the Fractional inhibitory concentration index (FIC).
In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreSupport Vector Machines (SVMs) are supervised learning models used to examine data sets in order to classify or predict dependent variables. SVM is typically used for classification by determining the best hyperplane between two classes. However, working with huge datasets can lead to a number of problems, including time-consuming and inefficient solutions. This research updates the SVM by employing a stochastic gradient descent method. The new approach, the extended stochastic gradient descent SVM (ESGD-SVM), was tested on two simulation datasets. The proposed method was compared with other classification approaches such as logistic regression, naive model, K Nearest Neighbors and Random Forest. The results show that the ESGD-SVM has a
... Show MoreWater balance approaches are strategies for resolving key theoretical and practical hydrological issues. The major goals of this study are to examine climatic elements and conditions to calculate groundwater recharge using the water balance approach. The study area is located in Mandaly city, Diyala Governorate, eastern Iraq. The metrological data was gathered between 1994 and 2020 to evaluate the study area's climate. The annual rainfall rate has been 248.61 mm, with a relative humidity of 43.89%, a temperature of 24.41 oC, a wind speed of 1.99 m/sec, sunshine of 8.32 hours per day, and evaporation of (268.09 mm). The total amount of corrected evapotranspiration was 1010.09 mm, with a peak value of 225.29 mm in Jul
... Show MoreThe study area is located in Al-Anbar Governorate, western Iraq. The climatic data were collected from Al-Ramadi Meteorological Station for the period 1990 to 2020 and used to assess the climatic condition of the study area. The total annual rainfall, relative humidity, monthly average temperature, evaporation, wind speed and sunshine duration are 108 mm, 52.7 %, 22.6˚C, 2814.3 mm, 2.2 m/s and 8.8 h/day, respectively. The climate of the study area is described as an arid to sub arid and relatively hot in summer and cold with low rain in winter. During the data used, the highest potential evapotranspiration was 217.1 mm in July, while the lowest value was 10.7 mm in January, with a total amount of 1170.07 mm. The highest and l
... Show MoreThis research provides a study of the virtual museums features and characteristics and contributes to the recognition of the diversity of visual presentation methods, as the virtual museums give the act of participation and visual communication with programs at an open time, so that it would contribute to reflection, thinking and recording notes, developing the actual and innovative skills through seeing the environments. The study has been divided into two sections the first one is virtual museum techniques. The techniques were studied to reach the public and are used remotely by the services of personal computers or smart phones being virtual libraries that store images and information that was formed and built in a digital way and how
... Show MoreAdvertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.