Pseudomonas aeruginosa gram-negative, bacilli and facultative aerobic, P. aeruginosa cause cystic fibrosis patients, wounds, burns, and immunodeficienct patients, that have many virulence factors such as pyocyanin , cytotoxic ,biofilm formation and motility, Eighty-eight isolates belonging to P. aeruginosa were collected including the 66 clinical isolates obtained from different hospitals in Baghdad and were from different sources and 22 environmental isolates from previous studies of soil near oil fields. Microscopical and cultural characteristics were studied and diagnosed using biochemical tests, VITEC device, their ability to adhere to non-living (Polystyrene), living cell line (A549) and cytotoxicity of bacterial filtrate by MTT method. The results displayed that all isolates belonged to P. aeruginosa. The pigment-forming (pe26 – pc36) isolates and (PE33 – PC31) non-pigment-forming isolates were selected. That all selected bacteria were able to adhere to the Polystyrene and an epithelial carcinoma of lung (A549) was of more than 300 colony formation units in dilution (1:10) ,(1:1000), and (1:10000). The toxicity of the P. aeruginosa filtrate (pc36) isolated from clinical sources and producing pigments was 15.7, 34.5, 44 % at a concentration of 40, 60, 80 % respectively, while the isolate (pc31) that was isolated from clinical sources and non-producing pigment was 28.1, 75.2, 80.9 % at the same concentrations. As for the isolate (pe26),isolated from environmental sources and forming the pigment, the inhibition rate was 38.5, 83.1, 48.8 % at concentrations of 40, 60, 80) % respectively, and the isolate (PE33) that was isolated from environmental sources was 42, 73.4, 74.1 % at concentrations of 40, 60, 80 % respectively. The study will be helpful in evaluating the effect of pigment formation in P. aeruginosa on adhesion.
During the two last decades ago, audio compression becomes the topic of many types of research due to the importance of this field which reflecting on the storage capacity and the transmission requirement. The rapid development of the computer industry increases the demand for audio data with high quality and accordingly, there is great importance for the development of audio compression technologies, lossy and lossless are the two categories of compression. This paper aims to review the techniques of the lossy audio compression methods, summarize the importance and the uses of each method.
Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra
Assessment of the in service behavior of asphalt stabilized subgrade soil under environmental impact has got little attention by the research workers. However, the sustainability of the roadway depends mainly on the welfare of its subgrade soil condition. In this work, Gypseous soil was stabilized with asphalt emulsion for subgrade usage, the durability of the mixture has been assessed in term of its ability to maintain the compressive strength when practicing the environmental impacts. Specimens of 38 mm in diameter , and 76 mm in height have been prepared with various water-asphalt percentages, and subjected to 30 cycles of (freezing-thawing), (heating-cooling) and (wetting-drying) processes. Specimens have been tested for unconfined comp
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThe subject of this research involves studying adsorption to remove hexavalent chromium Cr(VI) from aqueous solutions. Adsorption process on bentonite clay as adsorbent was used in the Cr(VI) concentration range (10-100) ppm at different temperatures (298, 303, 308 and 313)K, for different periods of time. The adsorption isotherms were obtained by obeying Langmuir and Freundlich adsorption isotherm with R2 (0.9921-0.9060) and (0.994-0.9998), respectively. The thermodynamic parameters were calculated by using the adsorption process at four different temperatures the values of ?H, ?G and ?S was [(+6.582 ? +6.547) kJ.mol-1, (-284.560 ? -343.070) kJ.mol-1 and (+0.977 ? +1.117) kJ.K-1.mol-1] respectively. This data indicates the spontaneous sorp
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned