The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, Central Children Hospital and Children's Protections Educational Hospital. Isolates bacterial were obtained cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system. The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar , golden yellow color on the Trypton Soy agar and green color on the Birillent Enterobacter sakazakii agar and gave a probability of 99% in the vitek 2 and were identified as Cronobacter sakazakii. The identification revealed of thirteen isolates: 6(46.16%) isolated from Cerebrospinal fluid samples, 7(53.84%) isolated from blood samples and not isolated bacteria from stool and urine samples. The results of the investigation of some virulence factors showed that all bacteria isolates were able to swimming with a diameter ranging (1-9 mm) and swarming with a diameter ranging (1-40 mm) and their ability to biofilm formation by using three methods. The results show the ability of isolates to form biofilm by using Congo red media methods where it is 12 (92.30 %) out of 13 isolated bacteria belonging to C. sakazakii able to form biofilm on the Congo red media which is 3 (23.07%) were strong production biofilm , 8 (61.53%) were intermediate production biofilm and 1 (7.69% ) were weak biofilm formation , while the 1 (7.69%) unable to form biofilm. Tubes method were all isolates were able to form biofilm, it were found that 3 (23.07%) isolates strong, and 8 (61.53%) intermediate and 2( 15.38%) weak biofilm formation. Microtiter plate method gave 5 (38.46 %) isolates strong, 6 (46.15%) intermediate and 1 (7.69%) weak biofilm formation.
The goal of the research is to find the optimization in the test of the appropriate cross-over design for the experiment that the researcher is carrying out (under assumption that there are carry-over effects of the treatments) to posterior periods after the application period (which is often assumed to be the first period). The comparison between the double cross-over design and the cross-over design with extra period. The similarities and differences between the two designs were studied by measuring the Relative Efficiency (RE) of the experiment.
Abstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the
... Show MoreThe current study included a review of the registration and description of the Theretra alecto Boi, 1827 (Levant hawk moth), samples were collected from various areas of the Baghdad belt and the provinces of the Middle Euphrates, confirmation in the description was on the most important parts of the body included the head and it's appendages, pronotum, wings as well as male and female genitalia. The morphological characteristics under study were enhanced by illustrations and images. Information on the locations and date of the collection was also confirmed. This study aims to identify the most important characteristics of the diagnosis of the species and the review of appearance variations, especially the analytical style of wings, coupling
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreAn overall mathematical model for copper pipe corrosion in flowing water was derived based on mass transfer fundamentals where we introduced the effects of boundary layer velocity, bulk flow velocity and the surface oxide protective film on the corrosion rate. A set of experiments were conducted in a straight 10mm diameter copper pipe, flow of water include six velocities of maximum value 7.33m/sec at 200C and 350C. The good agreement between the calculated and experimental corrosion rate values were achieved , the agreement reached 92% .
This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show More