Five serological methods for detection of Brucella were compaired in this study, Four of the methods are commonely used in the detections:- 1-Rose-Bengal: as primary screening test which depends on detecting antibodies in the blood serum. 2-IFAT: which detects IgG and IgM antibodies in the serum. 3-ELISA test: which detects IgG antibodies in the serum. 4-2ME test: which detects IgG antibodies The fifth methods. It was developed by a reasercher in one of the health centers in Baghdad. It was given the name of spot Immune Assay (SIA). Results declares that among (100) samples of patients blood, 76, 49, 49, 37, and 28. samples were positive to Rose Bengal, ELISA, SIA, 2ME and IFAT tests, respectively. When efficiency, sensitivity and specificity of the serological methods were compaired, the Following results were obtained: a) ELISA and SIA were superiors among the other confirming methods (2ME and IFAT) in detecting the highest cases (49 cases); 46 of them were from the (76) cases positive to Rose Bengal The confirmatory test 2ME was not efficient in detecting low concentrations of IgG antibodies when less than half (37) of the total positive cases (76) were detected by this test. b) IFAT test was the least efficient confirmatory test among all other test. c) As a new confirmatory test, SIA proved to be an efficient and serological test for Brucella detection in comparison with other tests. It is an easy to use test, rapid and could be performed without need to the expensive equipment .
Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreLet G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
A winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (P
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
In this research, we studied the effect of concentration carriers on the efficiency of the N749-TiO2 heterogeneous solar cell based on quantum electron transfer theory using a donor-acceptor scenario. The photoelectric properties of the N749-TiO2 interfaces in dye sensitized solar cells DSSCs are calculated using the J-V curves. For the (CH3)3COH solvent, the N749-TiO2 heterogeneous solar cell shows that the concentration carrier together with the strength coupling are the main factors affecting the current density, fill factor and efficiency. The current density and current increase as the concentration increases and the
The question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show More