Use Almtafr Alcderan orange, one of the factors Hashr Alttafaria to study Alatjabh isolates elected on the basis of specifications so that was a positive response with mutagen record and system consisting of three isolates used Alcderan orange graded concentrations and under specific Trov similar conditions Alttafar Pal NTG compared
Owing to high antibacterial resistance of Pseudomonas aeruginosa, it could be considered as the main reason behind the nosocomial infections. P. aeruginosa has a well-known biofilm forming ability. The expression of polysaccharide encoding locus (pelA gene) by P. aeruginosa is essential for this ability. The purpose of the current research was to determine the biofilm formation in P. aeruginosa isolated from clinical samples and to evaluate the role of the selected PelA gene in biofilm formation using PCR method in Iraqi patients. Results revealed that 24 (96%) isolates were found to have the ability to form biofilm that was remarkably related to gentamicin resistance. Moreover, the pelA gene was found in all biofilm-producers. In c
... Show MoreIn this study the isomerization of desulfuerized light Iraqi petroleum naphtha (Al-Dura Refinery) with boiling point range of 37 to 124 °C , 80.5 API specific gravity and 68.2 octane number has been investigated. Two types of catalysts were prepared (Pt/HX and Pt/SrX) by impregnation of 0.8 wt% Pt on l 3X-zeolite. The catalyst activity and selectivity toward isomerization, and catalyst deactivation were investigated.
The isomerization unit consisted of a vertical tubular stainless steel reactor of 2 cm internal diameter, 3 cm external diameter and 68 cm height. The operating pressure was atmospheric for all experimental runs. The liquid flow of lightnaphtha was 0.4 Uh, and the catalyst weight was 50 gm, H/
... Show More<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreObjectives of the study: The study aims to assess satisfy of the coronary artery patients for the care product from
the nurse and physician and to find out the relationship between patient satisfaction with the social and the
clinical characteristics of the patients.
Methodology: A descriptive design study conducted using the evaluation approach for the duration of June 3
rd
2012 to January 31, 2013. Non-probability sample of (60) patients who were visiting or admitted (inpatient or
outpatient) to the teaching hospital in Baquba with the diagnosis of coronary artery disease. A questionnaire have
been built and develop by the researcher based on review of literature and previous research, the form included of
(3) p
Objective: To assess nurses' exposure to hospitals chronic diseases hazards in Thi-Qar governorate, and to identify the association between nurses' socio-demographic characteristics of age, sex, marital status, place of work, the experience and educational attainment and their exposure to the hazards of chronic diseases. Methodology: A purposive "non-probability" sample of (433) nurses who were selected from four public hospitals in Thi-qar governorate for the period from November 4th 2013 to June 8th of 2014. Results: The study results indicated that that the vast majority of participants have mild chronic di
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThe mechanism of the electronic flow rate at Al-TiO2 interfaces system has been studied using the postulate of electronic quantum theory. The different structural of two materials lead to suggestion the continuum energy level for Al metal and TiO2 semiconductor. The electronic flow rate at the Al-TiO2 complex has affected by transition energy, coupling strength and contact at the interface of two materials. The flow charge rate at Al-TiO2 is increased by increasing coupling strength and decreasing transition energy.