Urinary tract infections (UTIs) mean microbial pathogens in the urethra or bladder (lower urinary tract). Important risk factors for recurrent UTI include obstruction of the urinary tract, use of a bladder catheter or a suppressed immune system. This study aims to isolate and identify bacteria from patients with TCC-bladder cancer or patients with a negative cystoscope and estimate antibiotic susceptibility patterns and evaluate some of the virulence factors. From a total of 62 patients with TCC-BC or negative cystoscope, only 35 favorable bacterial growths were obtained, including Escherichia coli (UPEC), a significant bacterial isolate, and Stenotrophomonas maltophilia. The percentage of multi drug-resistance bacteria (MDR) was identified in (62.8%) while the extended drug-resistance bacteria (XDR) was (28.5%). All isolates were producer for biofilm either moderately 18/35 (49%) or strongly 18/35 (51%). Only 25/35 (71%) isolates were produced for siderophore, while 10/35 (29%) isolates were non-produced. Inducing cytochrome P450 expression protein was seen in (14/35) 40% isolates. In conclusion, patients with TCC-BC or negative cystoscope who had a urinary catheter or immune-compromised were at high risk of infecting with nosocomial or opportunistic pathogens, which could be develop antibiotic resistance, the central problem in the cohort of patients undergoing chemotherapy or immune cancer therapy
The theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAbstract:
The achievement of agricultural development provide food security and to form a basis for economic growth and comprehensive social, requires a number of actions to overcome the obstacles and problems facing the development of this economic sector, to make it able to achieve food security and operation of the workforce, and reduce dependence on the outside in the provision of food peripherals, and so it is only available through the highest degree of efficiency and economic mobilization of resources, so most of the developed and developing countries alike seek to achieve sustainable agricultural development tobacco meet the food requirements and good jobs for c
... Show MoreWireless channels are typically much more noisy than wired links and subjected to fading due to multipath propagation which result in ISI and hence high error rate. Adaptive modulation is a powerful technique to improve the tradeoff between spectral efficiency and Bit Error Rate (BER). In order to adjust the transmission rate, channel state information (CSI) is required at the transmitter side.
In this paper the performance enhancement of using linear prediction along with channel estimation to track the channel variations and adaptive modulation were examined. The simulation results shows that the channel estimation is sufficient for low Doppler frequency shifts (<30 Hz), while channel prediction is much more suited at
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show MoreA new algorithm is proposed to compress speech signals using wavelet transform and linear predictive coding. Signal compression based on the concept of selecting a small number of approximation coefficients after they are compressed by the wavelet decomposition (Haar and db4) at a suitable chosen level and ignored details coefficients, and then approximation coefficients are windowed by a rectangular window and fed to the linear predictor. Levinson Durbin algorithm is used to compute LP coefficients, reflection coefficients and predictor error. The compress files contain LP coefficients and previous sample. These files are very small in size compared to the size of the original signals. Compression ratio is calculated from the size of th
... Show MoreThe current research dealt with the symbolic significance and its effectiveness in the design of the industrial product, the aesthetic communicative discourse that embodies the imagination and human conscience. Whether according to what has been termed custom or what has been approved by traditions long ago, symbolism may be the main actor in linking the identifying components of the product. In addition, symbolism provides the user with the key to accessing a direct awareness of the product’s shape and function, as an identification of the product by stimulating the symbolic form of the consumer’s imagination and inviting him to To meditate in order to realize the implicit meaning behind these forms and thus achieve the symbolism of
... Show MoreThe current research aims to know the method and strategy of rainstorming for students to open the door towards innovation and creativity in the field of teaching the subject of geography and the importance of brainstorming method and the studies that touched on it. The study also dealt with the steps of teaching the method of brainstorming and the most important (traditional and modern), and the difficulties of using the method of brainstorming in the teaching process, as well as explained the guidance to improve teaching using the method of brainstorming in the teaching p
... Show MoreLet be a commutative ring with 1 and be left unitary . In this paper we introduced and studied concept of semi-small compressible module (a is said to be semi-small compressible module if can be embedded in every nonzero semi-small submodule of . Equivalently, is semi-small compressible module if there exists a monomorphism , , is said to be semi-small retractable module if , for every non-zero semi-small sub module in . Equivalently, is semi-small retractable if there exists a homomorphism whenever . In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible and retractable respectively and give some of their adv
... Show More