An enzyme linked immunosorbent assay (ELISA) for the detection and quantitation of human immunoglobulin G (IgG) antibodies against vero- cytotoxine (VT) producing Escherichia coli serogroup O157:H7 was produced. E. coli O157: H7 lipopolysaccharide was extracted from locally isolated strains by using hot phenol- water method, followed by partial purification using gel filtration chromatography by sepharose- 4B. The purity of the lipopolysaccharide was checked by measuring the protein and nucleic acid content and then used as antigen. Four isolates of vero- cytotoxin producing E. coli serogroup O157:H7 was obtained by culturing 350 stool samples from children suffering from bloody diarrhea. These isolates were identified on bacteriological, serological and biochemical basis. Toxin production was confirmed on laboratory animals as well as by cytopathic effect on tissue culture. The possibility of using E. coli O157:H7 lipopolysaccharide in an enzyme- linked immunosorbent assay for the routine diagnostic testing of serum from patients for evidence of O157:H7 infection is discussed.
The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThis investigation is a study of the length of time where drops can exist at an oil-water interface before coalescence take place with a bulk of the same phase as the drops. Many factors affecting the time of coalescence were studied in is investigation which included: dispersed phase flow rate, continuous phase height, hole size in distributor, density difference between phases, and viscosity ratio of oil/water systems, employing three liquid/liquid systems; kerosene/water, gasoil/water, and hexane/water. Higher value of coalescence time was 8.26 s at 0.7ml/ s flow rate, 30cm height and 7mm diameter of hole for gas oil/water system, and lower value was 0.5s at 0.3ml/s flow rate, 10 cm height and 3mm diameter of hole for hexane
... Show MoreDust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show MoreBackground:-The Modified Alvarado Scoring
System (MASS) has been reported to be a cheap
and quick diagnostic tool in patients with acute
appendicitis. However, differences in diagnostic
accuracy have been observed if the scores were
applied to various populations and clinical settings.
Objectives:- The purpose of this study was to
evaluate the diagnostic value of Modified Alvarado
Scoring System in patients with acute appendicitis
in our setting.
Methods:-one hundre twenty eight patients, were
included in this study, admitted to Al-Kindy
teaching hospital from June 2009 to June 2010.
Patients’ age ranged from 8 to 56 years (21±10)
they were divided into three groups; paediatrics,
child bear
Solar tracking systems used are to increase the efficiency of the solar cells have attracted the attention of
researchers recently due to the fact that the attention has been directed to the renewable energy sources. Solar tracking systems are of two types, Maximum Power Point Tracking (MPPT) and sun path tracking. Both types are studied briefly in this paper and a simple low cost sun path tracking system is designed using simple commercially available component. Measurements have been made for comparison between fixed and tracking system. The results have shown that the tracking system is effective in the sense of relatively high output power increase and low cost.
Background: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being
Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.
Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.
Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More
