This study includes collection of 70 swabs samples of burns from patients were
admitted in three hospitals (Baghdad, Al- Numaan and burns injuries Hospital). All
swabs samples were cultured on blood and MacConkey agar media to isolate and
identify pathogenic bacteria according to their morphological , biochemical and
growth characters. Growth of bacteria on selective media showed the following
results: Pseudomonas aeroginosa 44.28% , Klebsiella pneumonia 30% ,
Staphylococcu saureus 8.57% , Escherichia coli 4.28% , Proteus vulgaris 4.28 % ,
Enterobacter spp. 5.71% , Acinetobacter baumanni 2.89 %. Different concentrations
were prepared from leaves ethanolic crude extract of Catharanthus roseus , then the
anti-bacterial activity of this extract was evaluated in vivo. Burns were achieved
experimentally in Albino mice and contaminated with pathogenic bacteria and
evaluate the ability of extract in healing of these infected burns. Results showed that
the extract accelerate burns healing within 7days.
Background: Chronic atrophic gastritis is a precancerous lesion. A commonly used test for the diagnosis of chronic atrophic gastritis, gastric endoscopy with biopsy collection, and a good
serological test would be best include low levels of pepsinogen I (PGI) or a low PGI/PGII ratio.
Aim of the study: T o confirm the use of serum pepsinogens as a screening marker in atrophic gastritis.
Patients and Methods: A study was conducted in the period between December 2005 and March 2006 on 25 patients with atrophic gastritis attending Gastroenterology and Hepatology Teaching Hospital in Baghdad, and 25 healthy control subjects. Sera were tested for PGI and PGII by ELISA test.
Results and Conclusions: th
It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
This study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThis study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More