Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
In this paper, thirty six samples of canned vegetables were collected randomly from
different markets in Baghdad city from October 2013 till March 2014. The study
includes identifying the concentration of some heavy metals (lead, nickel, zinc and iron)
by flameless atomic absorption spectrophotometery. It was found that the higher
concentrations of heavy metals in canned vegetables, was lead 1.179 ppm in olive,
nickel 0.9078 ppm in olive, while zinc 10.143 ppm green peas and iron 90.601ppm in
white asparagus; but the lower concentrations represents with lead 0.0021 ppm in green
asparagus, nickel 0.0202 ppm in mushroom, while zinc 0.528 ppm in white asparagus
and iron 4.061 ppm in green peas. Canned food has been r
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreBacterial vaginosis (BV) is one of the most common genital infections among women in the childbearing age. Many novel, fastidious and uncultivated bacterial species are related with BV. These are called bacterial vaginosis associated bacteria (BVAB), present in trace amount and have a significant role in the infection. A total of 80 vaginal swabs were obtained from 80 pregnant and non-pregnant women. Samples were collected from different hospitals in Baghdad city and Al-Kut city.
Clinically, 60 sample among 80 were gave positive results depending on Nugent score and Amsel criteria ,the Bacteriologicall test showed the percentages of gram negative bacteria (E.coli ,K.pneumoniae, P.mirabilis, Ps.aeruginosaand A. baumanniiwere) were (38.
Abstract
The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa
... Show MoreThere is not enough studies about bacterial contamination of air condition system in the cars and houses, bacterial detection of such surrounding is necessary for the human environment.
The object of recent study was to evaluate the level of bacterial contamination in air conditioner in cars and houses in Baghdad city, Iraq.
Air samples were taken indoor from cars and house air conditioner in the Baghdad city. The result indicated that gram positive bacteria more than gram negative bacteria in air conditioner. Air condition of cars (20-500 CFU) was more contaminated than of houses (10-100 CFU).
Bacillus was the most frequently bacterial isolates genus with recovery rate B
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More