This study has been done on plant [Adhatoda vasicia , Acanthaceae family],which has been collected from gardens of university of Baghdad The leaves of plant were extracted by methanol alcohol obtain the crude extraction good ratio(30%).Eighty swabs or samples were collected from several wounds patients of hospitals in Baghdad city.These swabs were cultured on blood and MacConkey ager to isolate bacteria and identified by appearance and bio chemical tests.The results showed that(60)somples were positive(75%)for tests bacteria white the other(20)swabs were negative(25%).The bacteria were identified as Pseudomonas aeruginosa ,Staphylococcus awreus , Esherichia coli,Proteus spp and Klebsiella spp; and their number percentage were(32)isolates(49.2 %),(7)isolates(10.7%),(5)isolates(7.6%),(1)isolate(1.5%)and(20)isolates(30.7%)respectivity.Crude extract teated by sensitivity test against the bacteria with concentration (2,4,6,8,10,12mg/ml).The results showed that the inhibition zone increased with increasing ils concentration The best concentration that inhited most of the bacteria is(6 mg/ml) of the crud extract that was isolated from wounds .
This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreStress urinary incontinence (SUI) is involuntary urine leakage during activities that increase abdominal pressure such as coughing, sneezing and lifting of heavy weights. This is a very common disorder among women with history of multiple vaginal deliveries with an obstructed labor. SUI is considered one of the most distressing problems, especially for younger women, with severe quality of life implications, it caused by the loss of urethral support, usually as a consequence of the supporting structural muscles in the pelvis.
Objective: To prove and demonstrate the effect of a fractional CO2 micro-ablative laser (10600nm) in intra vaginal therapy for treating SUI and achieve a clinical improvement of t
... Show MoreThe aim of this paper is to design fast neural networks to approximate periodic functions, that is, design a fully connected networks contains links between all nodes in adjacent layers which can speed up the approximation times, reduce approximation failures, and increase possibility of obtaining the globally optimal approximation. We training suggested network by Levenberg-Marquardt training algorithm then speeding suggested networks by choosing most activation function (transfer function) which having a very fast convergence rate for reasonable size networks. In all algorithms, the gradient of the performance function (energy function) is used to determine how to
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreX-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin
... Show MoreReferral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the and articles, as expressed by a particular client, and is a combination of affi
... Show MoreThe OSPF cost is proportionally indicated the transmitting packet overhead through a certain interface and inversely proportional to the interface bandwidth. Thus, this cost may minimized by direct packet transmitting to the other side via various probable paths simultaneously. Logically, the minimum weight path is the optimum path. This paper propose a novel Fuzzy Artificial Neural Network to create Smart Routing Protocol Algorithm. Consequently, the Fuzzy Artificial Neural Network Overlap has been reduced from (0.883 ms) to (0.602 ms) at fuzzy membership 1.5 to 4.5 respectively. This indicated the transmission time is two-fold faster than the standard overlapping time (1.3 ms).
A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show MoreIn this work, the methods (Moments, Modified Moments, L-Moments, Percentile, Rank Set sampling and Maximum Likelihood) were used to estimate the reliability function and the two parameters of the Transmuted Pareto (TP) distribution. We use simulation to generate the required data from three cases this indicates sample size , and it replicates for the real value for parameters, for reliability times values we take .
Results were compared by using mean square error (MSE), the result appears as follows :
The best methods are Modified Moments, Maximum likelihood and L-Moments in first case, second case and third case respectively.