This study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-body of Cholera Bacteria .The results was compared with the 2nd method which depends on the cultural characteristics of the cultural media, also the bacteria was diagnosis using the biochemical inspects by the system of API 20E in addition to the using of antisera to specify serotype& sub-serotype ( Monovalent, Polyvalent(O1) . Also, the relation between the disease & the months in the year in which the disease appear was studied. The results show the ability to isolate & identifecate (78) isolate for the serotype (01) in the fast method ( Rapid Visual Test ) ( Crystal V-C ) , & after the bacteriology inspects on these (78) isolate the all isolates were belongs for Cholera Bacteria of the serotype (01) till the sub-serotype , all the (78) isolates were belongs to the sub-serotype (Inaba). The results show, the most infection was in September (36) , & October (22).
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreThis study evaluates the flexural behavior of ultra-thin (50 mm) one‑way reinforced‑concrete (RC) slabs retrofitted with near‑surface mounted (NSM) carbon‑fiber‑reinforced polymer (CFRP) rods under quasi‑static loading. T300‑grade CFRP rods (≈4 mm diameter) were bonded in pre‑cut 7 mm × 7 mm grooves using a two‑part epoxy. As a proof-of-concept experimental baseline, three simply‑supported specimens (1000 mm × 500 mm × 50 mm) were tested in a six‑point bending configuration (four applied loads + two reactions): two conventional controls and one strengthened slab. A load‑control rate of ~15 kN/min was applied; the controls were cycled twice and the strengthened slab four times. Relative to the average of
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis study aims at identifying how Baghdad Municipality employs public relations in law enforcement operations and the role played by the Municipality in communication and communicating with the public, raising their awareness and educating them to not abuse public property. As for the research tools, the researcher used the questionnaire as a data collection tool in addition to an analytical description of the means and methods of communication for public relations on Baghdad Municipality Facebook page.
The research comes out with a set of result; the most important of which are:
The means through which citizens learned about the existence of campaigns to impose the law an eliminate violati
In this paper ,the problem of point estimation for the two parameters of logistic distribution has been investigated using simulation technique. The rank sampling set estimator method which is one of the Non_Baysian procedure and Lindley approximation estimator method which is one of the Baysian method were used to estimate the parameters of logistic distribution. Comparing between these two mentioned methods by employing mean square error measure and mean absolute percentage error measure .At last simulation technique used to generate many number of samples sizes to compare between these methods.
Specialized banks provide their banking activities to their customers at interest rates that are determined according to the approved bank policy, which is almost similar to most or most banks. To satisfy the financial desires of customers and at the same time it is a source of the bank's profits, However, these banks have been introduced to new services that they provide with the funds of the Central Bank initiative launched at the beginning of (2016) to address the economic stagnation that befell the country due to the (financial security) crisis that the country faced in 2014. To put forward initiatives amounting to nearly (15) trillion dinars, which were put forward through private commercial and Islamic banks and specialized
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show Morepriorities of materials research due to their promising properties, especially in the field of thermoelectricity. The efficiency or performance of thermoelectric devices is expressed in terms of the thermoelectric figure-of-merit (ZT) – a standard indicator of a material’s thermoelectric properties for use in cooling systems. The evaluation of ZT is principally determined by the thermoelectric characteristics of the nanomaterials. In this paper, a set of investigative computations was performed to study the thermoelectric properties of monolayer TMDCs according to the semiclassical treatment of the Boltzmann transport equation. It was confirmed that the thermoelectric properties of 2D materials can be greatly improved compared with thei
... Show More