Pseudomonas aeruginosa gram-negative, bacilli and facultative aerobic, P. aeruginosa cause cystic fibrosis patients, wounds, burns, and immunodeficienct patients, that have many virulence factors such as pyocyanin , cytotoxic ,biofilm formation and motility, Eighty-eight isolates belonging to P. aeruginosa were collected including the 66 clinical isolates obtained from different hospitals in Baghdad and were from different sources and 22 environmental isolates from previous studies of soil near oil fields. Microscopical and cultural characteristics were studied and diagnosed using biochemical tests, VITEC device, their ability to adhere to non-living (Polystyrene), living cell line (A549) and cytotoxicity of bacterial filtrate by MTT method. The results displayed that all isolates belonged to P. aeruginosa. The pigment-forming (pe26 – pc36) isolates and (PE33 – PC31) non-pigment-forming isolates were selected. That all selected bacteria were able to adhere to the Polystyrene and an epithelial carcinoma of lung (A549) was of more than 300 colony formation units in dilution (1:10) ,(1:1000), and (1:10000). The toxicity of the P. aeruginosa filtrate (pc36) isolated from clinical sources and producing pigments was 15.7, 34.5, 44 % at a concentration of 40, 60, 80 % respectively, while the isolate (pc31) that was isolated from clinical sources and non-producing pigment was 28.1, 75.2, 80.9 % at the same concentrations. As for the isolate (pe26),isolated from environmental sources and forming the pigment, the inhibition rate was 38.5, 83.1, 48.8 % at concentrations of 40, 60, 80) % respectively, and the isolate (PE33) that was isolated from environmental sources was 42, 73.4, 74.1 % at concentrations of 40, 60, 80 % respectively. The study will be helpful in evaluating the effect of pigment formation in P. aeruginosa on adhesion.
Abstract
The model of financial reporting in Iraq Based on a specific set of accounting objectives & concepts, which require the application of the historical cost valuation approach due to the nature of the objectives of financial reporting in Iraq, established under the unified accounting system , which focuses on serving the needs of the state because it the most influential user in setting accounting objectives and concepts, which stems mainly from the nature of the economic system in Iraq, which focuses on the public sector versus the private sector as well as the nature of the ownership business that focuses on partnership versus corpor
... Show MoreIn this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and
Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreIn this research a proposed technique is used to enhance the frame difference technique performance for extracting moving objects in video file. One of the most effective factors in performance dropping is noise existence, which may cause incorrect moving objects identification. Therefore it was necessary to find a way to diminish this noise effect. Traditional Average and Median spatial filters can be used to handle such situations. But here in this work the focus is on utilizing spectral domain through using Fourier and Wavelet transformations in order to decrease this noise effect. Experiments and statistical features (Entropy, Standard deviation) proved that these transformations can stand to overcome such problems in an elegant way.
... Show MoreA Multiple System Biometric System Based on ECG Data
Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.