G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreAbstract The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhiza
... Show MoreIn order to investigate the presence of methicillin or multidrug resistant Staphylococcus aureus in food-chain especially Cows raw milk and white raw soft cheese and its whey, a total of 30 samples were collected randomly from different markets in Baghdad Province during December 2012 till February 2013, in which samples were analyzed by a standard isolation protocols of food microbiology with some modification processing by new, modern and rapid technology tools such as chromogenic medium Baird-Parker agar, Electronic RapIDTM Staph Plus Code Compendium Panel System (ERIC®) Dryspot Staphytect Plus and Penicillin Binding Protein (PBP2') Plus assays; as well as, studying the susceptibility of isolates to different selected antibiotics. The r
... Show MoreThe present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhizal colonization in al
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MorePolycystic ovary syndrome (PCOS) is one of the most common endocrine disorder. To determine the metabolic disorders in women with PCOS, (25) women with PCOS ages (15 - 47) years have been investigated and compared with (20) healthy individuals. All the studied groups were carried out to measure fasting blood sugar, (anti-GAD Ab, anti β-islet cell Ab by IFAT) and measured insulin level by ELISA. There was significant elevation in the concentration of fasting blood sugar than in control groups (p ≤ 0.05) and there was negative results for anti-GAD Ab and anti β-islet cell Ab by IFAT test for serum of women with PCOS, while there was significant differences in the insulin level for women with PCOS compared with control groups (p ≤ 0.05),
... Show MorePolycystic ovary syndrome (PCOS) is one of the most common endocrine disorder. To determine the metabolic disorders in women with PCOS, (25) women with PCOS ages (15 - 47) years have been investigated and compared with (20) healthy individuals. All the studied groups were carried out to measure fasting blood sugar, (anti-GAD Ab, anti ?-islet cell Ab by IFAT) and measured insulin level by ELISA. There was significant elevation in the concentration of fasting blood sugar than in control groups (p ? 0.05) and there was negative results for anti-GAD Ab and anti ?-islet cell Ab by IFAT test for serum of women with PCOS, while there was significant differences in the insulin level for women with PCOS compared with control groups (p ? 0.05), these
... Show MoreThis paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show More