Biofilm formation represents one of the biggest problems facing scientists because of this phenomenon linkage with virulence of bacteria and other clinical environmental problems. In the present study, two clinical isolates,
Escherichia coli, and Staphylococcus aureus were exposed to the non thermal plasma for different intervals of time (1, 2, 4, 8, and 16 min). The biofilm was measured post exposing. It was found that 2 min. exposing to non-thermal plasma reduced the biofilm formation by both clinical isolates significantly. It can be concluded that the ability of S. aureus to form biofilm higher than E. coli and exposing for 2 min to non-thermal plasma sufficient to reduce the biofilm formation by both isolates significantly.
Coronavirus disease 2019 (COVID-19) is caused by severe acute respiratory syndrome called coronavirus 2 (SARS-CoV-2). Due to its concerning rate of transmission and intensity, coronavirus was classified as a pandemic on March 11, 2020. With the continuous evolution of the viral genome and mutations that may alter infectivity, disease severity or interactions with host immunity, SARS-CoV-2 has evolved into many variants: Alpha (B.1.1.7 lineage), Delta (B.1.617.2 lineage), Delta plus (B.1.617.2.1), Omicron (B.1.1.529 lineage) and other variants. Thus, this study aimed to find and provide database for local clinical characteristics of different variants of SARS-COV-2 and severity of infection with viral load compared with the wild
... Show MoreIn recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression
This study, which was conducted in the city of Mosul, through collected 1200 samples from the stool of patients with diarrhea attending hospitals and private clinics for the period from the beginning of January 2019 to the end of December 2019, those whose ages ranged from less than a year-60 year, and for both sexes and by reality 700 samples stool for males and 500 samples stool for females. Samples were collected in clean, sterile, and sealed 40ml plastic bottles. Patient information is noted, name of the parasite, history, sex, age, address. The result showed that climate and temperature have a significant effect on increase the incidence of intestinal parasites through the direct effect on the increase in infection rate. This effect wa
... Show MoreThe main purpose of this paper is to show that zero symmetric prime near-rings, satisfying certain identities on n-derivations, are commutative rings.
Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim
... Show MoreThe current research aims to identify the types and rates and the reasons for the crimes that are with the origin and sexual scattered deviation between the fabric of Iraqi society, which reticent about because of the culture of the community, where he offered a researcher investigator justice and tribal leaders and lawyers about proportion and the types and causes of crime is the origin of sexual deviance and finally a question asked a researcher in 1000 young lived their adolescence days of the former regime (1979-2003) from going to brothels researcher found that 920 people and 92% had gone to the house to practice adultery and that 70 of them, and by 7% had engaged in masturbation only and that 10 of them have not committed anything
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreCosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show MoreBackground: Neonatal screening for congenital hypothyroidism (CH) is an essential preventive public health program for early identification of disorders that can lead to potentially catastrophic health problems
Objectives: This is a pilot study conducted to determine the incidence of CH among infants born in two major maternity hospitals in Baghdad City and to build a model for nationwide screening program.
Methods: A prospective study on screening of all newborns was conducted in two major maternity hospitals in Baghdad, from 01.12.2001 - 31.12.2002. A total of 6949 neonates were screened for CH, cord blood samples were examined for serum TSH levels by immunoflourecent method (ELIZA) and reexamined for T4 using a cutoff&
... Show More