Various pathological specimens (180) were collected from patients suffering
from pseudomonas aeruginosa infections from different hospitals in Baghdad from January
to May 2011; these specimens include (Blood samples,sputum,urine and wound swabs) were
tested for pseudomonas aeruginosa producing 2-Aminoacetophenone.Wounds swabs
specially taken from burns and post surgical infections producing a higher concentration of 2-Acetophenone material than from other samples were tested for this material and most of
these were isolated bases on their distinctive grape- like odor of 2-Aminoacetophenone
production usually linked with patients whose immune system compromised by disease or
trauma, its gains access to these patients tissue through burns, although the grape odor is
sometimes difficult to detect in culture media.
These methods can be utilized to assay 2-aminoacetophenone (2AA) production in a
varies media. Its synthesis occurs relatively early in the growth cycle. It has proved easy and
convenient to detect 2-aminoacetophenone (2AA) excretion by Pseudomonas aeruginosa after
24 h of incubation on blood agar plates employing thin layer chromatography of ether extracts
of the agar medium.
Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show MoreMost young children provoke negative reactions from parentral interference. These reactions worsen child's behavior. Starting a harmful pattern leading to emergence of an aggressive behavior. A cross sectional study was carried out in Al-Sadr city, Baghdad. The target population was represented by all students attending governmental secondary schools, who are resident in Al-Sadr city aged between 13 and 21 year. The data collected by self-reported questionnaire (Aggression—Problem Behavior Frequency Scale). A total of 720 students contributed in this study. Out of the total, there were 257 (35.7%) students raised by illiterate mothers. Out of those, there were 241 (93.8%) students reported aggressive behavior.
... Show MoreComputer analysis of simple eye model is performed in the present work by using the Zemax optical design software 2000E . The most important optical parameters of the eye were calculated such as the effective focal length (EFL) , the image spot size at the retina and found to be in a reasonable agreement with the values needed for the laser retinal treatment .The present eye model leads to an effective wavelength and we found the image spot diagram at the surface of the retina and the wavefront error which are provided at zero field angle. This gives a good evidence of the validity of the model in one hand, and can be used to determine the compatibility of any optical design intended for visual applications. By using the pulse fre
... Show MoreIn this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.
The right to property is one of the most prominent and most important of the fundamental rights that the individual enjoys, whether national or foreign, both of them have their own private property that may not be affected except for the requirements of the country's economic development or what is known as the public benefit, and the Iraqi legislator did not specify what is meant by the removal of foreign investment. Of the bilateral international agreements (BITS), as it determined its terms and methods, the properties of foreign investors may be expropriated in a direct and indirect way.
Seventy five adult virgin female Norway rats (60 experimental and 15 controls) were used toevaluate the effect of seeds of three herbs (Fennel, Cumin and Garden cress) on their mammaryglands. Experimental animals were fed with these herbs (each type of herb seeds was given to twentyexperimental rats) for fourteen days. Rats were sacrificed and mammary gland sections wereobtained, stained then morphometrically assessed. Serum prolactin level was performed too.Results revealed that Garden cress seeds are the strongest lactogenic agent among the three. BothFennel and Cumin seeds were shown to be very weak galactagogues.
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.