This study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-body of Cholera Bacteria .The results was compared with the 2nd method which depends on the cultural characteristics of the cultural media, also the bacteria was diagnosis using the biochemical inspects by the system of API 20E in addition to the using of antisera to specify serotype& sub-serotype ( Monovalent, Polyvalent(O1) . Also, the relation between the disease & the months in the year in which the disease appear was studied. The results show the ability to isolate & identifecate (78) isolate for the serotype (01) in the fast method ( Rapid Visual Test ) ( Crystal V-C ) , & after the bacteriology inspects on these (78) isolate the all isolates were belongs for Cholera Bacteria of the serotype (01) till the sub-serotype , all the (78) isolates were belongs to the sub-serotype (Inaba). The results show, the most infection was in September (36) , & October (22).
Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreAccurate prediction of river water quality parameters is essential for environmental protection and sustainable agricultural resource management. This study presents a novel framework for estimating potential salinity in river water in arid and semi‐arid regions by integrating a kernel extreme learning machine (KELM) with a boosted salp swarm algorithm based on differential evolution (KELM‐BSSADE). A dataset of 336 samples, including bicarbonate, calcium, pH, total dissolved solids and sodium adsorption ratio, was collected from the Idenak station in Iran and was used for the modelling. Results demonstrated that KELM‐BSSADE outperformed models such as deep random vector funct
Abstract
Objectives: The study is carried out to assess functional performance for heart's valve replacement patients and find out relationship with sociodemographic data and clinical data
Methodology: Descriptive design is carried out at cardiac surgery centers in Baghdad ; Ibn -Al Betar Specialized for cardiac surgery center and Al-Iraqi center for cardiac disease. its initiation from December28the 2013 to September 1st 2014,A non- probability (purposive) sample of 50 adults patients are attended cardiac surgery centers at Baghdad city and who have heart valves replacement. The data collection through development of questionnaire which is composed from three parts(socio demographic data, clinical information, functional performa
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.
The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p
... Show More