From 211 urine samples, Gram negative bacteria were isolated from only 61 urine samples with isolation percentage 28.9%. Escherichia coli were isolated percentage 70.49% while Klebsiella pneumoniae and Psendomonas aeruginosa were 8.19% and 6.55%, respectively.Proteus spp. Were isolated from 9 (14.75%), P. mirablis and P. vulgaris were isolates percentage 11.47% and 3.27%, respectively. Uroepithelial Cell Adhesin (UCA) fimbriae expression by P.mirabilis isolates was detected by the high capacity to adhesion to human uroepithetial cells, the isolate p.mirabilis U7 was adhesion to human uroepithelial cells mean no.30.2 bacteria/cell when grown on luria broth at 37C for 24h, but then grown it’s on luria agar at 37C for 24h the adhesion mean no. was 20.3 bacteria/cell. P.mirabilis U4 the adhesion mean no.4.7% and 1.65% when grown on luria broth and luria agar at 37C for 24h, respectively. MR/P and MR/K fimbriae was induced by growth on luria broth at 37C for 48h and reduced by growth on agar media. UCA fimbriae were isolated and partially purified by using 2 molar urea, heat shock, saturated ammonium sulphate 50% and deoxycholate, yielded 1.65 g/ml. SDS.PAGE of partially purified UCA-fimbriae after ammonium sulfate precipitation showed 6 protein containing bands, for 5 bands (molecular weight 17782 Dalton) represented UCA-fimbriae.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAbstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show MoreThis research aims to predict new COVID-19 cases in Bandung, Indonesia. The system implemented two types of deep learning methods to predict this. They were the recurrent neural networks (RNN) and long-short-term memory (LSTM) algorithms. The data used in this study were the numbers of confirmed COVID-19 cases in Bandung from March 2020 to December 2020. Pre-processing of the data was carried out, namely data splitting and scaling, to get optimal results. During model training, the hyperparameter tuning stage was carried out on the sequence length and the number of layers. The results showed that RNN gave a better performance. The test used the RMSE, MAE, and R2 evaluation methods, with the best numbers being 0.66975075, 0.470
... Show MoreIn this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Abstract This study investigated the treatment of textile wastewater contaminated with Acid Black 210 dye (AB210) using zinc oxide nanoparticles (ZnO NPs) through adsorption and photocatalytic techniques. ZnO NPs were synthesized using a green synthesis process involving eucalyptus leaves as reducing and capping agents. The synthesized ZnO NPs were characterized using UV-Vis spectroscopy, SEM, EDAX, XRD, BET, Zeta potential, and FTIR techniques. The BET analysis revealed a specific surface area and total pore volume of 26.318 m2/g. SEM images confirmed the crystalline and spherical nature of the particles, with a particle size of 73.4 nm. A photoreactor was designed to facilitate the photo-degradation process. The study investigated the inf
... Show MoreThis effort is related to describe and assess the performance of the Iraqi cement sample planned for oil well-cementing jobs in Iraq. In this paper, major cementing properties which are thickening time, compressive strength, and free water in addition to the rheological properties and filtration of cement slurry underneath definite circumstances are experimentally tested. The consequences point to that the Iraqi cement after special additives encounter the requests of the API standards and can consequently is used in cementing jobs for oil wells. At this research, there is a comparative investigation established on experimental work on the effectiveness of some additives that considered as waste materials which are silica fume, bauxite,
... Show MoreLink failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,
... Show More