Staphylococcus haemolyticus is one of the most frequently isolated coagulase-negative staphylococci. The ability to form biofilm is considered as one of the most important virulence factors of coagulase negative staphylococci. There is only limited knowledge of the nature of S. haemolyticus biofilms. This study was aimed at evaluating the ability of S. haemolyticus strains to produce biofilm in the presence of copper oxide nanoparticles (CuONPs). The biological synthesis of nanoparticles is an environmentally friendly approach for large-scale production of nanoparticles. Copper oxide nanoparticles were produced in the current study from the S. haemolyticus viable cell filtrate. UV-visible (UV-Vis) spectroscopy, X-ray diffra
... Show MoreThis study includes adding chemicals to gypseous soil to improve its collapse characteristics. The collapse behavior of gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59% was investigated using five types of additions (cement dust, powder sodium meta-silicate, powder activated carbon, sodium silicate solution, and granular activated carbon). The soil was mixed by weight with cement dust (10, 20, and 30%), powder sodium meta-silicate (6%), powder activated carbon (10%), sodium silicate solution (3, 6, and 9%), and granular activated carbon (5, 10, and 15%). The collapse potential is reduced by 86, 71, 43, 37, and 35% when 30% cement dust, 6% powder sodium meta-silicate, 10% powder activated
... Show MoreThe research consists of five chapters, and in the first chapter, it addresses the introduction and importance of the research, where the researcher explained the importance of bio-motor abilities and their role in achieving a high level through their connection to the skill performance of standing on the hands followed by the forward roll, and the research problem: Do these bio-motor abilities have an impact on the level of skill performance? Handstand followed by forward roll.
ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge we
... Show MoreAbstract\
preparation process of performance evaluation in organizations is of extreme importance, and under development in organizations and the opening of markets and technological developments in the industry and heightened competition among industrial organizations imposed systems are built for performance give a clear picture about performance and competition, And centered research problem in answering the following questions: Is performance evaluation system is available in Wasit State Company for Textile Industries(Research sample ), This research aims to assess the performance of policies and programs in the company, according to guide performance evaluation of programs and policies prepared by the Dutch Cou
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreKinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More