The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, Central Children Hospital and Children's Protections Educational Hospital. Isolates bacterial were obtained cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system. The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar , golden yellow color on the Trypton Soy agar and green color on the Birillent Enterobacter sakazakii agar and gave a probability of 99% in the vitek 2 and were identified as Cronobacter sakazakii. The identification revealed of thirteen isolates: 6(46.16%) isolated from Cerebrospinal fluid samples, 7(53.84%) isolated from blood samples and not isolated bacteria from stool and urine samples. The results of the investigation of some virulence factors showed that all bacteria isolates were able to swimming with a diameter ranging (1-9 mm) and swarming with a diameter ranging (1-40 mm) and their ability to biofilm formation by using three methods. The results show the ability of isolates to form biofilm by using Congo red media methods where it is 12 (92.30 %) out of 13 isolated bacteria belonging to C. sakazakii able to form biofilm on the Congo red media which is 3 (23.07%) were strong production biofilm , 8 (61.53%) were intermediate production biofilm and 1 (7.69% ) were weak biofilm formation , while the 1 (7.69%) unable to form biofilm. Tubes method were all isolates were able to form biofilm, it were found that 3 (23.07%) isolates strong, and 8 (61.53%) intermediate and 2( 15.38%) weak biofilm formation. Microtiter plate method gave 5 (38.46 %) isolates strong, 6 (46.15%) intermediate and 1 (7.69%) weak biofilm formation.
Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreAbstract
The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.
The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as
Background: The scarce literature regarding oral hygiene attitude and periodontal awareness in Iraqi adults warranted the conduction of this study in order to provide a public profile and a baseline data for further researches. Aims of the study: assessing the oral hygiene attitude and periodontal awareness in a sample of Iraqi adults. Materials and Methods: Self-administered questionnaires were distributed to 500 adults. Results: Out of the 500 questionnaires distributed, 482 were included in the study.92% of the sample practiced tooth brushing, 69% out of them reported a daily brushing pattern with variable frequency,69% of the sample did not receive oral hygiene education from any source ,more than half of the sample 60 % used the hori
... Show MoreA complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵) have been obtained. A new representation of their tensor product is naturally arisen and computed in details.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreOffline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters. In this paper a proposed method for Offline Arabic handwritten recognition. The proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and support vector machines (SVMs) to enhance the recognition accuracy. The proposed method experimented using (AHDB) database. The experiment result show (99.08) recognition rate.