The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, Central Children Hospital and Children's Protections Educational Hospital. Isolates bacterial were obtained cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system. The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar , golden yellow color on the Trypton Soy agar and green color on the Birillent Enterobacter sakazakii agar and gave a probability of 99% in the vitek 2 and were identified as Cronobacter sakazakii. The identification revealed of thirteen isolates: 6(46.16%) isolated from Cerebrospinal fluid samples, 7(53.84%) isolated from blood samples and not isolated bacteria from stool and urine samples. The results of the investigation of some virulence factors showed that all bacteria isolates were able to swimming with a diameter ranging (1-9 mm) and swarming with a diameter ranging (1-40 mm) and their ability to biofilm formation by using three methods. The results show the ability of isolates to form biofilm by using Congo red media methods where it is 12 (92.30 %) out of 13 isolated bacteria belonging to C. sakazakii able to form biofilm on the Congo red media which is 3 (23.07%) were strong production biofilm , 8 (61.53%) were intermediate production biofilm and 1 (7.69% ) were weak biofilm formation , while the 1 (7.69%) unable to form biofilm. Tubes method were all isolates were able to form biofilm, it were found that 3 (23.07%) isolates strong, and 8 (61.53%) intermediate and 2( 15.38%) weak biofilm formation. Microtiter plate method gave 5 (38.46 %) isolates strong, 6 (46.15%) intermediate and 1 (7.69%) weak biofilm formation.
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreIn this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g
... Show More
Background: Drawing blood to measure total serum bilirubin is painful & time consuming. Transcutaneous bilirubinometer working by multiwavelength spectral reflectance from the skin surface on forehead or upper sternum is a quick & painless technique. Objectives: to compare the effectiveness of transcutaneous (over the upper sternum and forehead) and serum bilirubin measurement of neonate with jaundice. Subjects and Methods: This is a cross sectional prospective study. It enrolled 175 jaundiced neonates & excluded those exposed to phototherapy. It was conducted at Child Central Teaching Hospi |
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe present work reports the electrochemical synthesis of poly N Terminal tetrahydrophthalamic acid on stainless steel 316 (S.S), which acts as a working electrode, using an electrochemical polymerization technique. Fourier Transform Infrared Spectroscopy (FT-IR), Atomic Force Microscope (AFM) and Scanning Electron Microscope (SEM) characterized the formed polymer film. Corrosion protection tests for coated and uncoated S.S with polymer film were studied in 0.2 M hydrochloric acid (HCl) solution by using electrochemical polarization technique. Kinetic and thermodynamic activation parameters (Ea, A, ΔH*, ΔS* and ΔG*) were calculated. The biological activity of the polymeric film was determined against Gram positive (Staphy
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreFicus (FIC) leaf extract used as corrosion inhibitor for carbon steel alloy (C.S) in two corrosive environments (saline and acidic) with four concentrations (1, 2, 3 and 4 ppm) at varied temperature range between (298-328 K) using electrochemical polarization measurements. The importance of this work focused on the use the green chemistry that is far from the chemical materials effect. The results of polarization presented the FIC inhibitor consider a mixed type (anodic and cathodic) inhibitor. Tafel curve used to evaluate the corrosion inhibition activity. In a saline medium, the best inhibitor efficiency reaches to (87%) in 2 ppm and IE% reach to (99%) for HCl medium inhibited by 1ppm. Langmuir isotherm obeys the study by thermodynamic pa
... Show More