The usage of blue laser has been considered as a therapeutic approach to prohibit the viability of bacterial species, but there is no agreement about optimum parameters to be used. The aim of this project is to study the influence of blue laser (450 nm) on the viability of the gram-negative bacteria Proteus mirabilis isolated from burn wounds, using different exposure times (i.e. doses) in vitro. Seventy swab samples were collected from burn wounds of patients admitted to the burns unit in AL-Yarmouk teaching hospital in Baghdad, during the period from June to August 2019. The Bacteria were isolated and identified depending on their culture characteristics, biochemical tests, gram staining, and morphology, being f
... Show MoreBackground: Sperm motility disorder is an important cause of infertility in male, and one of the causes of reduced motility of the sperm is the disorders of the mitochondria because it provides the required energy for sperm motility, Laser biostimulation or low-level laser therapy has a positive effect on the mitochondria and led to increasing the synthesis of ATP. Method: Twenty fresh human semen samples were used in this research study, each sample was separated into two portions, one was used as control which is not exposed to the laser beam and the other was irradiated with the wavelength of 410 nm diode laser with an output power of 100 mW and an exposure time of 60 seconds, then the measurement of
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreSeismic inversion technique is applied to 3D seismic data to predict porosity property for carbonate Yamama Formation (Early Cretaceous) in an area located in southern Iraq. A workflow is designed to guide the manual procedure of inversion process. The inversion use a Model Based Inversion technique to convert 3D seismic data into 3D acoustic impedance depending on low frequency model and well data is the first step in the inversion with statistical control for each inversion stage. Then, training the 3D acoustic impedance volume, seismic data and porosity wells data with multi attribute transforms to find the best statistical attribute that is suitable to invert the point direct measurement of porosity from well to 3D porosity distribut
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreBy driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
Background: Leishmaniasis is important public
health problem owing to its impact on morbidity
and mortality and difficulties in application of
effective control measures.
Objective: The aim of the study is to evaluate the
using of impregnate bed nets in the control of
leishmaniasis.
Methods: The study was conducted throughout
the years 2004 and 2005, in Diala Governorate
(about 60km north-east Baghdad). This is the first
study in Iraq for evaluation of the impregnated bed
net in control of leishmaniasis. Two villages were
selected to achieve this aim. The nets were
distributed for the first village to be used by their
population. The second village was served as
control.
Results: The
... Show MoreBackground : The kidneys may be injured in abdominal trauma, both blunt & penetrating. Renal trauma may manifest in a dramatic fashion for both the patient and the clinician. Objectives: To evaluate the incidence, management, morbidity &mortality of renal injury in blunt & penetrating abdominal trauma.
Results:The majority o f patients were males (35= 77.8%), the rest were females (10= 22.2%). The average age was 37 years (range= 18-56 years). The most common grades were grade1, grade2 and grade3 (40=88.9%), while 5 patients (11.1%) were grades 4 and 5.The most common associated injuries were liver, spleen, small & large bowels and diaphragm. The mortality was 20% (9 patients). The most common cause of death was multip
A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
It is suitable to use precast steel-concrete composite beams to quickly assemble a bridge or a building, particularly in isolated regions where cast-in-situ concrete is not a practical option. If steel-concrete composite beams are designed to allow demountability, they can also be extremely useful in the aftermath of natural disasters, such as earthquakes or flooding, to replace damaged infrastructure. Furthermore, rapid replacement of slabs is extremely beneficial in case of severe deterioration due to long-term stressors such as fatigue or corrosion. The only way to rapidly assemble and disassemble a steel-concrete composite structure is to use demountable shear connectors to connect/disconnect the steel beams to/from the concrete slab. I
... Show More