Under high concentrations of antibiotics, a fraction of the bacterial population exhibits a phenomenon known as persistence. Toxin- system (TA system) has been reported to be involved in the formation of E. coli, Mycobacterium, and S. aureus persisters. In this study, the ability of thirty Iraqi isolates of MRSA to form in vitro persister cells after exposure to three different antibiotics (Ceftriaxone 30 µg, Mecillinam 10 µg, and Mupirocin 20 µg) was examined by TD test. Additionally, efflux pump inhibitor [Fluphenazine 0.25 mg/ml] was combined with the antibiotic that triggered persister formation. The distribution of mazEF and yefM-yoeB (Type II TA system) in the tested isolates was detected by PCR. 91% of Mupirocin su
... Show MoreCuneiform symbols recognition represents a complicated task in pattern recognition and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted
... Show More Today, the use of iris recognition is expanding globally as the most accurate and reliable biometric feature in terms of uniqueness and robustness. The motivation for the reduction or compression of the large databases of iris images becomes an urgent requirement. In general, image compression is the process to remove the insignificant or redundant information from the image details, that implicitly makes efficient use of redundancy embedded within the image itself. In addition, it may exploit human vision or perception limitations to reduce the imperceptible information.
This paper deals with reducing the size of image, namely reducing the number of bits required in representing the
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>) below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are
... Show MoreThis study shows that it is possible to fabricate and characterize green bimetallic nanoparticles using eco-friendly reduction and a capping agent, which is then used for removing the orange G dye (OG) from an aqueous solution. Characterization techniques such as scanning electron microscopy (SEM), Energy Dispersive Spectroscopy (EDAX), X-Ray diffraction (XRD), and Brunauer-Emmett-Teller (BET) were applied on the resultant bimetallic nanoparticles to ensure the size, and surface area of particles nanoparticles. The results found that the removal efficiency of OG depends on the G‑Fe/Cu‑NPs concentration (0.5-2.0 g.L-1), initial pH (2‑9), OG concentration (10-50 mg.L-1), and temperature (30-50 °C). The batch experiments showed
... Show MoreTwo-dimensional electrical resistivity imaging and seismic refraction, in the form of down-hole survey, were applied to delineate the subsurface section and elastic moduli and identify geotechnical characteristics of subsurface materials in the 10th of Ramadan industrial area, Cairo, Egypt. The results of four 2-D profiles of electrical resistivity, in the form of dipole–dipole and Wenner configurations, revealed that the subsurface section contains two main geo-electrical layers; the first is made of sand, some silt, and gravels, reflecting low resistivity values ranging from 25 to 65.5 ohm m. This layer is overlying a high resistivity layer (65.5 to135 ohm m), corresponding to medium to coars
... Show MoreIntended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted
... Show MoreUse of lower squares and restricted boxes
In the estimation of the first-order self-regression parameter
AR (1) (simulation study)