The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, (Central Children Hospital and Children's Protections Educational Hospital) The Iraqi Ministry of Health, the Department of Health Baghdad .the period from the first of 2015 September to the first of December 2015, Were obtained isolates bacterial subjected to the cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system .The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar, golden yellow color on the Trypton Soy agar and green color on the Birillent Enterobacter sakazakii agar and gave a probability of 99% in the vitek 2 and were identified as Cronobacter sakazakii. The identifcation revealed of thirteen isolates, (6) isolated from Cerebrospinal fluid samples and its contamination with percent 12%, (7) isolated from blood samples and its contamination with percent 14% and not isolated bacteria from stool and urine samples. Detection of zpx gene showed the presence of this gene in 13(100%)of isolates
A computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimensi
... Show MoreThis study investigates the implementation of Taguchi design in the estimation of minimum corrosion rate of mild-steel in cooling tower that uses saline solution of different concentration. The experiments were set on the basis of Taguchi’s L16 orthogonal array. The runs were carried out under different condition such as inlet concentration of saline solution, temperature, and flowrate. The Signal-to- Noise ratio and ANOVA analysis were used to define the impact of cooling tower working conditions on the corrosion rate. A regression had been modelled and optimized to identify the optimum level for the working parameters that had been founded to be 13%NaCl, 35ᴼC, and 1 l/min. Also a confirmation run to establish the p
... Show MorePultruded materials made of Fiber-Reinforced Polymer (FRP) come in a broad range of shapes, such as bars, I-sections, C-sections, etc. FRP materials are starting to compete with steel as structural materials owing to their great resistance, low self-weight, and cheap maintenance costs, especially in corrosive conditions. This study aims to evaluate the effectiveness of a novel concrete Composite Column (CC) using Encased I-Section (EIS) as a reinforcement in contrast to traditional steel bars by using Glass Fiber-Reinforced Polymer (GFRP) as I-section (CC-EIS) to evaluate the effectiveness of the hybrid columns which have been built by combining GFRP profiles with concrete columns. To achieve the aims of this study, nine circular co
... Show MoreAccurate calculation of transient overvoltages and dielectric stresses from fast-front excitations is required to obtain an optimal dielectric design of power components subjected to these conditions, which are commonly due to switching and lightning, as well as utilization of power-electronic devices. Toroidal transformers are generally used at the low voltage level. However, recent investigations and developments have explored their use at the medium voltage level. This paper analyzes the model-based improvement of the insulation design of medium voltage toroidal transformers. Lumped and distributed parameter models are used and compared to predict the transient response and dielectric stress along the transformer winding. The parameters
... Show MoreThere is an interesting potential for the use of GFRP-pultruded profiles in hybrid GFRP-concrete structural elements, either for new constructions or for the rehabilitation of existing structures. This paper provides experimental and numerical investigations on the flexural performance of reinforced concrete (RC) specimens composite with encased pultruded GFRP I-sections. Five simply supported composite beams were tested in this experimental program to investigate the static flexural behavior of encased GFRP beams with high-strength concrete. Besides, the effect of using shear studs to improve the composite interaction between the GFRP beam and concrete as well as the effect of web stiffeners of GFRP were explored. Encasing the GFRP
... Show MoreIn this study, a three-dimensional finite element analysis using ANSYS 12.1 program had been employed to simulate simply supported reinforced concrete (RC) T-beams with multiple web circular openings subjected to an impact loading. Three design parameters were considered, including size, location and number of the web openings. Twelve models of simply supported RC T-beams were subjected to one point of transient (impact) loading at mid span. Beams were simulated and analysis results were obtained in terms of mid span deflection-time histories and compared with the results of the solid reference one. The maximum mid span deflection is an important index for evaluating damage levels of the RC beams subjected to impact loading. Three experi
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt