The purpose of this study was to investigate the bacterial etiology of urinary tract infections microbiologic properties of Escherichia coli isolated from urinary tract infection patients against nine amoxicillin antibiotic. E.coli isolates were collected from patients samples suffering from urinary tract infection, based on biochemical tests of Epi 20 system .Nine Amoxicillin antibiotics were selected (some vials and other are capsules) which manufactured in different countries were bought from local pharmacies in Baghdad, for the purpose of knowing the inhibitory activity of these antibiotics on E.coli one of the main microorganisms to cause urinary tract infection, the antibiotics were prepared in a concentration of 100mg/ml and their activity was tested against the growth of the selected isolates and variations in the results were noted. Antimicrobial susceptibility was tested by the disk diffusion method. Results showed that. E. coli reveals variations in the susceptibility to amoxicillin.
This research deals with processing and Interpretation of Bouguer anomaly gravity field, using two dimensional filtering techniques to separate the residual gravity field from the Bouguer gravity map for a part of Najaf Ashraf province in Iraq. The residual anomaly processed in order to reduce noise and give a more comprehensive vision about subsurface linear structures. Results for descriptive interpretation presented as colored surfaces and contour maps in order to locate directions and extensions of linear features which may interpret as faults. A comparison among gravity residual field , 1st derivative and horizontal gradient made along a profile across the study area in order to assign the exact location of a major fault. Furthermor
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
In this paper, mixed spinel Co0.4Zn0.6Fe2O4 ferrite was synthesized by microwave-assisted combustion method. Photocatalytic activity of the as-synthesized sample was investigated against methylene blue dye at room temperature at different exposure times (60-360 min.) under visible light. Phase impurity and surface morphology which are investigated with XRD analysis and field emission- scanning electron microscopy, indicate that a cubic spinel unit cell structure with a crystilite size and lattice constant are 22.5048nm and 8.37Å, respectively. The saturation magnetization exhibited directly from the hysteresis loop is (70.20emu/g). Optical properties for the investigated ferrite
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreIn many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreA harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.
This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreThis study was done in Baghdad teaching Hospital by using developed instrument type GIOHO and included a number of patients with compressed breast thickness (7,8,9,10)cm .
The relationship between radiation dose and breast thickness was linear. All results were compared with the international standered values that measured by the International Nuctear Agency and Europeon sources ,it was found that it is in consistance or has a little difference .
The study showed that the mean absorbed dose may be determined by using TLD measurement below 10 mGy and the glandular dose was (1.45 mGy) and this can not b
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me