The aim of this study was to evaluate in-vitro activity of Cefamandol and Ceftazidime, in combination with potassium clavulanate against 10 uropathogenic E.coli isolated from patients with chronic complicated urinary tract infections (UTIs), these isolates were identified by the Api identification systems.The antimicrobial susceptibility tests were determined by Kirby-Bauer method and the minimum inhibitory concentrations of Cefamandol and Ceftazidime, were determined, by tube method. These isolates were resistant to Ampicillin (Amp), Amoxicillin (Amo), Carbenicillin (Cb), Ticarcillin (Tic), Amoxicillin\ Potassium Clavulanate {Augmentin}, (Amo\CA), Ticarcillin\ Potassium Clavulanate {Timentin} (Tic\CA), Cefamandol (Cfm) and Ceftazidime (
... Show MoreThis research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear
... Show MoreCognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig
... Show MoreCognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreIn this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec