A total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates gave positive results of 27 isolates (87%) and in varying ratio, whereas the Microtiter Plate method showed that all P. mirabilis isolates were Biofilm formation (100%) and in different ratio. The urease enzyme was detected as one of the most important virulence factors that P. mirabilis possessed by Ure C gene and through molecular technique polymerase chain reaction (PCR), where it was found that 29 isolates (93.5%) out of 31 isolates gave a positive result to having the Ure C gene.
The present work aimed to study the efficiency of nanofiltration (NF) and reverse osmosis (RO) process for water recovery from electroplating wastewater and study the factors affecting the performance of two membrane processes. Nanofiltration and reverse osmosis membranes are made from polyamide as spiral wound module. The inorganic materials ZnCl2, CuCl2.2H2O, NiCl2.6H2O and CrCl3.6H2O were used as feed solutions. The operating parameters studied were: operating time, feed concentrations for heavy metal ions, operating pressure, feed flow rate, feed temperature and feed pH. The experimental results showed, the permeate concentration increased and water flux decreased with increase in time from 0 to 70 min. The permeate concentrations incre
... Show MoreThe present work aimed to study the efficiency of nanofiltration (NF) and reverseosmosis (RO) process for water recovery from electroplating wastewater and study the factors affecting the performance of two membrane processes. Nanofiltration and reverse osmosismembranes are made from polyamide as spiral wound module. The inorganic materials ZnCl 2 CuCl2 .2H2O, NiCl.2.6H2O and CrCl3.6H2O were used as feed solutions. The operating parametersstudied were: operating time, feed concentrations for heavy metal ions, operating pressure, feed flow rate, feed temperature and feed pH. The experimental results showed, the permeateconcentration increased and water flux decreased with increase in time from 0 to 70 min. Thepermeate concentrations incre
... Show MoreThe current study aimed to adopt a method for inducing callus cells and regenerating the important common red bean using different types of growth regulators such as N6-benzylaminopurine (BAP), Naphthalene acetic acid (NAA), and Thidiazuron (TDZ). Different types of common bean pinto cultivar explants, such as internodes, cotyledons and roots, were inoculated on Murashige and Skoog medium (MS) provided with different combinations of plant growth regulators, including 1- BAP (5 mg/l) 2-BAP (4.5 mg/l) NAA (0.5 mg/l), 3- BAP (4.5 mg/l), and TDZ (0.1mg/l). Callus was initiated on MS culture medium supplied with 5 mg/l BAP for all explants (internodes, cotyledons, and roots) at 50, 20, and 10% respectively, while adding NAA with 0.5mg/l showed
... Show MoreBackground: The new concepts and technologies continue to change the dynamics of endodontic practices in the world. Rapid and significant changes in techniques, instrument design, and the type of metals used to manufacture endodontic instruments which have been made during the last few years in an attempt to overcome canal preparation errors. The purpose of this study is to measure and compare canal transportation and centering ability of Self Adjusting File with two rotary nickel-titanium (Ni-Ti) systems, ProTaper and BioRaCe at different levels. Material and Methods: Forty five distal roots of mandibular first molars with moderate curvature were selected using Schneider method. Roots were divided randomly into 3 groups of 15 each and were
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More