The current study aimed to investigate the viability of biofilm formation klebsilla pneumoniae and Staphylococcus aureus. 440 urine samples were collected from patients suffering from urinary tract infection (UTI) from those who were admitted and visitors to Al-Ramadi Teaching Hospital, Al-Yarmouk Teaching Hospital, Al-Ramadi Teaching Hospital for women and children and , Teaching Laboratories in the Medical City for both genders for a period extended from 5 July, 2017 to 10 October, 2017. Samples were diagnosed by culturing them on a selective media and by biochemical testes , also, diagnosis was ensured by using VITEK-2 compact system. Results showed that K.pneumoniae isolation ratio was 17.1%(68) and S.aureus ratio was 13.1%(52). Their sensitivity was tested against 10 antibiotics, isolates showed uneven resistance according to the type of bacteria. Bacterial biofilm formation viability was detected by qualitative and quantitative methods, isolates per bacteria. Artificial material was used proteinase K and α-Amylase with triple concentrations to each enzyme 33,100,250 µg/ml and 20,100,200 mg/ml respectively, with biofilm inhibition of testing bacteria by precision calibration dishes method. Result showed noticeable decreasing in biofilm formation after enzymes addition in comparison with its formation before enzymes addition, where high decreasing ratio of biofilm according to proteinase K was at concentration 33µg/ml with 95% ratio, while less inhibition to K.pneumoniae, the same concentration showed inhibition viability at 93% and less inhibition viability at 259 µg/ml with 61%. Also, regarding to α-Amylase showed a high inhibition activity at 95%with concentration 100 mg/ml to S.aureus and less inhibition ratio was found at 20 mg/ml with 87%. While to K.pneumoniae , the triple concentrations showed inhibition activity ranged between 36-77%. Statistical analysis showed presence of significant variation between each enzyme concentration to both types of bacteria, also presence of significant variation among different concentration to each bacterial type at (P≤0.01).
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe search (floors and transparent role in the design studios satellite channels) and presented as a study-oriented, and the research aims to identify the role of flooring transparent spaces studios satellite channels and side performative and aesthetic, and formulas design to highlight the role floors transparent spaces studios satellite channels. And highlight the importance of research, particularly in its contribution to the clarification of the concept of the relationship between transparency and performing aesthetic treatments for floors by clarifying its role in the designs of the internal spaces of the studios, as well as his contribution to the founding of the theory of looking at the base of such concepts. To achieve the object
... Show MoreBringing about urban, economic, and social changes in rural areas similar to those occurring in urban areas aims to reduce urban-rural disparities by providing services in those areas, decentralizing the management of these services, expanding citizen participation in local governance (decentralized administration), and achieving comprehensive development, developing and empowering localities, and keeping pace with new transformations and their impacts on the functions of the center and localities. In fact, the lack of clarity of the role of local government in planning and managing services has hindered development plans, and declined the level of services in rural areas, and has negative
... Show MoreThe aim of the research is to assess the practice of tax administration to diminish the strategic direction of (proactive, analytical, defensive, response) and the nature of its relationship to organizational excellence represented by (leadership, strategic planning, focus on taxpayers, information and analysis and knowledge management, focus on operations, focus on forces. The questionnaire was adopted as a main tool in collecting data and information from the sample members of the General Authority for Taxes (110) who are in the site (m. Second Division Manager, Ms The statistical program (SPSS) was used to calculate (mean, standard deviation, difference coefficient, correlation coefficient, t-test). The research reached a number
... Show MoreThis paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71
... Show MoreBackground: Malignant lymphoma is the generic term given to tumors of the lymphoid system and specifically of lymphocytes and their precursor cells, While all lymphomas are malignant neoplasms, there is a wide spectrum of clinical behavior, with some following an indolent clinical course and others behaving in an aggressive manner (will causing death in a short time frame if left untreated). The metastatic process involves intravasation and extravasation of tumor cells, followed by reimplantation of tumor cells, formation of a new tumor stoma, Degradation of the extracellular matrix and components of the basement membrane by proteases facilitates the detachment of tumor cells, their crossing of tissue boundaries, and invasion into adjacent
... Show More