Several remote sensor network (WSN) tasks require sensor information join. This in-processing Join is configured in parallel sensor hub to save battery power and limit the communication cost. Hence, a parallel join system is proposed for sensor networks. The proposed parallel join algorithm organizes in section-situated databases. A novel join method has been proposed for remote WSNs to limit the aggregate communication cost and enhance execution. This approach depends on two procedures; section-situated databases and parallel join algorithm utilized to store sensor information and speed up processing respectively. A segment arranged databases store information table in segmented shrewd. The Parallel-Joining WSN algorithm is effectively feasible for two clear reasons. Firstly, the decisive join conveyed fragments. Secondly, parallel-joining is in the fly processed sensor data. Creatively, a parallel dispersed algorithm has been developed to gain time compared to the single disseminated algorithm.
Out of Hundred clinical samples, taken from different sources include burn, blood , wound and nasal swabs infections ; 90 isolates developed growth on mannitol salt agar. Among these, 40 (44.4%) were Coagulase positive (Staphylococcus aureus) isolates and 50 (55.5%)belong to coagulase negative staphylococci, in which the last Staphylococcus epidermidis isolates were 30(60%).Antibiotic susceptibility of Staphylococcus epidermidis isolates to 12 antibiotics were determined using disc diffusion method . The results revealed that high resistance to Penecillin G10 and Amoxiclav (Amoxicillin- clavulanic acid) ( 100%) and the high sensitivity to Imipenim (95%). The pattern of minimum inhibitory concentration of S.epidermidis isolates to vancomy
... Show MoreThe aim of the study was molecular detection of C. neoformans that isolated from 150 (88 female and 62 male) clinical samples (sputum samples) from pulmonary patients in Baghdad. The diagnoses of Cryptococcus neoformans in samples was done by using direct microscopic examination, culture media and PCR Technology. Microscopic examination and cultured revealed that 65 out of 150 (43.33 %) samples were positive and the others samples were Negative. Results of the genetic diagnosis looking for the fungi causing cryptococcosis using primers specific for ITS gene which were specially designed for this study revealed that 6 (4 %) of sputum samples were positive. In this study used the PCR technology due to the present
... Show MoreLeishmaniasis is endemic ofIraq in both cutaneous and visceral form. The available tools for diagnosis and detection of Leishmaniaare nonspecific and may interfere with other species. In this study, Polymerase Chain Reaction (PCR) has been used to identify Iraqi isolate of visceral leishmaniasis (MHOM/ IQ/2005/MRU15) which a previously diagnosed by classical serological tests. PCR amplificationwas carried out using species-specific primers of Leishmania donovani. Four primer pairs of mini-circle DNA and ITS-1 were used.13A/13B, which is used to identify Leishmaniaas a genus, NM12, LITSR/L5.8S and BHUL18S, were used to detect the sub species of L. donovani.The result ofPCR
... Show Moreيهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MorePalm vein recognition technology is a one of the most effective biometric technologies for personal identification. Palm acquisition techniques are either contact-based or contactless-based. The contactless-based palm vein system is considered more accurate and efficient when used in modern applications, but it may suffer from problems like pose variations and the delay in the matching process. This paper proposes a contactless-based identification system for palm vein that involves two main steps; First, the central region of the palm is cropped using fast extract region of interest algorithm, then the features are extracted and classified using altered structure of Residual Attention Network, which is a developed version of convolution
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
The aim of this study was to Identifying The Effect of using Linear programming and Branching programming by computer in Learning and Retention of movement concatenation(Linkwork) in parallel bars in Artistic Gymnastics. The searchers have used the experimental method. The search subject of this article has been taken (30) male - students in the second class from the College of Physical Education/University of Baghdad divided into three groups; the first group applied linear programming by computer, and the second group has been applicated branching programming by computer, while precision group used traditional method in the college. The researchers concluded the results by using the statistical bag for social sciences (spss) such as both
... Show MoreSteganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show MoreMeerkat Clan Algorithm (MCA) that is a swarm intelligence algorithm resulting from watchful observation of the Meerkat (Suricata suricatta) in the Kalahari Desert in southern Africa. Meerkat has some behaviour. Sentry, foraging, and baby-sitter are the behaviour used to build this algorithm through dividing the solution sets into two sets, all the operations are performed on the foraging set. The sentry presents the best solution. The Flexible Job Shop Scheduling Problem (FJSSP) is vital in the two fields of generation administration and combinatorial advancement. In any case, it is very hard to accomplish an ideal answer for this problem with customary streamlining approaches attributable to the high computational unpredictability. Most
... Show MoreClastic-carbonate succession which including the Nahr Umr and Mauddud Formations are represented a part of Albian-Early Turonian Sequence (Wasi`a Group). The present study includes Petrography, microfacies analysis, depositional environment, digenetic development, and reservoir characterization for seven boreholes (Lu-2, Lu-4, Lu-5, Lu-8, Lu-13, Lu-14 and Lu-39) within Luhais Oil field South Iraq.
There are six type of carbonate microfacies were recognized in the Mauddud Formation:- Orbitolina - Milliolids wackestone to packstone Orbitolina wackestone to packstone, miliolids wackestone, Peloidal wackestone to packstone, Ooides to Peloids grainstone and bioclastic Wackestone - Packstone. These microfacies are represented three depositi