This study was designed to investigate the capability of gram-negative bacteria that isolated form wound and burn infection to production of Biofilm which included (32) isolates, which have multi – drug resistant to antibiotics. The isolates included (10) Pseudomonas aeruginosa, (9) Klebsiella pneumoniae, (6) Escherichia coli, (5) Proteus mirabilis and (2) Enterobacter cloacae. The method used method links the crystal violet with biofilm and reading by ELISA which was adopted on the values of optical density of violets that linked to the mass of biofilm at the wavelength of (620) nm, the test results showed variation of biofilm composition for all bacterial species depending on the optical density value while the most production of biofilm was product form bacterial isolated from diabetes patients wound. Agarose gal electrophoreses results show that all isolate have a different plasmid profile according to the (size and position), it was also that temperature used as a curing factor causes a high frequency loss the plasmid from all isolates and according to this reason the yield was different after the curing that maybe refers to the role of both plasmid and chromosome in regulating this phenomena.
The purpose of the International Financial Reporting Standard (IFRS 15) is to determine the basis for reporting useful information to the users of financial reports on the nature, amount, timing and uncertainty about revenues and cash flows arising from a contract with a customer. It is based on specific conditions for recognizing revenue from the contract. When the two parties to the contract or one of them fulfil the performance obligations, specifically after the customer has the ability to exercise control over the product or service that is the subject of the contract. As a result of the failure of the revenue reporting requirements in the Iraqi environment to provide adequate and honestly representative information on the o
... Show MoreHeavy metals especially lead (Pb), cadmium (Cd), chromium (Cr) and copper (Cu) are noxious pollutants with immense health hazards on living organisms, these pollutants enter aquatic environment in Iraq mainly Tigris and Euphrates rivers via waste water came from different anthropological activities, This study investigated capacity of dried and ground root of water hyacinth (Eichhornia crassipes) in removing the heavy metals from their aqueous solutions. Effects of initial concentrations of the heavy metals and pH of their aqueous solutions were studied. Results of this study revealed excellent biosorption capacity of water hyacinth root in general, removal of Pb was the highest and Cr was lowest. The results showed that the Pb, Cu and C
... Show MoreThis paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreThe study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show MoreThe present paper agrees with estimation of scale parameter θ of the Inverted Gamma (IG) Distribution when the shape parameter α is known (α=1), bypreliminarytestsinglestage shrinkage estimators using suitable shrinkage weight factor and region. The expressions for the Bias, Mean Squared Error [MSE] for the proposed estimators are derived. Comparisons between the considered estimator with the usual estimator (MLE) and with the existing estimator are performed .The results are presented in attached tables.
Laurylamine hydrochloride CH3(CH2)11 NH3 – Cl has been chosen from cationic surfactants to produce secondary oil using lab. model shown in fig. (1). The relationship between interfacial tension and (temperature, salinity and solution concentration) have been studied as shown in fig. (2, 3, 4) respectively. The optimum values of these three variables are taken (those values that give the lowest interfacial tension). Saturation, permeability and porosity are measured in the lab. The primary oil recovery was displaced by water injection until no more oil can be obtained, then laurylamine chloride is injected as a secondary oil recovery. The total oil recovery is 96.6% or 88.8% of the residual oil has been recovered by this technique as shown
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper is concerned with preliminary test double stage shrinkage estimators to estimate the variance (s2) of normal distribution when a prior estimate of the actual value (s2) is a available when the mean is unknown , using specifying shrinkage weight factors y(×) in addition to pre-test region (R).
Expressions for the Bias, Mean squared error [MSE (×)], Relative Efficiency [R.EFF (×)], Expected sample size [E(n/s2)] and percentage of overall sample saved of proposed estimator were derived. Numerical results (using MathCAD program) and conclusions are drawn about selection of different constants including in the me
... Show More
Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show More