Atotal of 75 different clinical samples were collected from different hospitals in Baghdad Biochemical and morphological characterization tests showed that forty isolates were identified as Staphylococcus aureus Antibiotic susceptibility tests of all isolates towards ten antibiotics were carried out and results showed that many isolates (97.5 %) were resistant to ?-lactam antibiotic , 70 % were resistant to Tetracyclinee , 62.5% were resistant to co-trimoxazole , 60 % were resistant to ciprofloxacin , 55% were resistant both of chloramphenicol and erythromycin , 52.5% were resistant to gentamicin , 35% were resistant to rifampicin , 10% were resistant to vancomycin . According to the above results the S.aureus I1 which is isolated from patients with osteomyelitis showed resistant to all ten antibiotics therefore was used in the followed experiments. The minimum inhibitory concentration (MIC) of S.aureus I1 vancomycin, cefotaxim , penicillin G, amoxicillin , ciprofloxacin , co-trimoxazole ,gentamicin, rifampicin was checked.The results showed that isolates had MIC between (390-12500) ?g/ml. The combination of different antibiotics with vancomycin showed synergistic effect based on the Fractional inhibitory concentration index (FIC).
This paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreA Multiple System Biometric System Based on ECG Data
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
Islam was keen to get every man and woman a share of those benefits and wanted to marry and urged him. In order to unite efforts and articulates the arrow and clarifies the goal and I have a share in building a sober Islamic society, for all this and other research title is ((modern or planting and its impact on marital happiness)).
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreAbstract Globalization dominated in the last decade of the twentieth century and the eve of the third millennium over economic,politics,psychology,culture,communications and information sciences,it's a historical phenomenon refer to many important transitions in humanitarian life.It foxes on that state has illusion its historical role in the psychologist,economic and political buldings. Globalization issue and its influence in North Korea put a spotlight on political,economic and cultural situations,the political system resists any change with many limitations on political freedoms,human rights and political multiplicity.Libralism trends and free market are so weaken when it comparing within the bad economic situation of the coun
... Show More