Body odour is the smell caused by bacteria feeding on sweat on the skin, especially in the armpit and groin area. Fifty-four volunteers from students and employees of college of Education Ibn Al- Haitham, were surveyed. Data were obtained concerning: subject details and microbial examination. The following conclusions were reached: 1) coagulase negative Staphylococcus was the most common isolate. 2) The most effective antibiotics were amikacin, ciprofloxacin, vancomycin, cephalothin, tobramycin, gentamycin respectively and were least sensitive to methicillin and penicillin G. 3) Alum zirconium and alum chlorohydrate were the most effective antiperspirants.
beef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the
... Show MoreThe following study was conducted to investigate the correlation between the expression of three different genes (NOB1, DDX47, CD101( with the occurrence and development of chronic myeloid leukemia (CML) in Iraq. The difference in the expression of these genes between patients and healthy controls was studied. Moreover the correlation of age and gender with CML occurrence and comparing with control was also examined. Results showed significant increases in mean of gene expression level (ΔCt) of patient groups for all genes compared to the corresponding ΔCt means in control group, also the gene expression folding (2-ΔΔCt) reflect significant differences in the expression of these genes and CD101, mRNA showed the highest level in CML pati
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More