The Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin Cefotoxam and Methoprim.
This study aims to analyze the spectral properties of plasma produced from rice husk(Rh) using the laser breakdown spectroscopy (LIBS) method. The plasma generation process used the fundamental harmonic (1064 nm) of a Q-switched Nd:YAG laser. Yttrium aluminum garnet (YAG) is a man-made crystalline material. The laser fired pulses with a duration of 10 ns and a repetition rate of 6 Hz. Thus, the energy outputs achieved were 50–200 mJ at the wavelength of 1064 (nm). The silica content in the rice hulls was verified using an XRF measurement, which revealed the presence of silica in the rice hulls in a high percentage. Precise beam focusing was achieved by focusing the laser on the target material. This target material is placed with
... Show MoreAim: The study aimed to investigate the presence of the specific B1 gene T gondii in blood and milk samples from natural infected cattle and pregnant women (16-30 weeks) whose examination performed by the officers at the women's and children's Educational hospital in Al-Diwaniyah, Iraq. Materials and methods: A total of 150 serum samplings were collected analysed and scanned for Anti-T gondi antibodies (75 naturally-infected goats and 75 pregnant women with Toxoplasma). Polymerase chain reaction (PCR) was used to detect of B1(399pb) gene in 26 goat's blood samples and 7 samples from pregnant women. Results: A quick-test anti-cassette gondii results showed 26 positive samples of goats in a percentage of 34,666 percent, while a higher percent
... Show MoreMaintenance of hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysi
... Show MoreBackground:The effects of contraception on Trichomonas vaginalis have important implications for women who suffer from infections associated with disruptions in the vaginal ecology, such as bacterial vaginitis and urinary tract infections.
Objective: To find the association of the common types of contraceptions with the Trichomonasvaginalis infection in women admitted to the Al-BatoolTeaching Hospital for Maternity and Children in Baqubah city.
Type of study: Cross-sectional study
Methods: This study consist of 75 women with contraception use and71 apparently healthy non contraception user women admitted to outpatient in Al
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More