Abstract: Background: Optical biosensors offer excellent properties and methods for detecting bacteria when compared to traditional analytical techniques. It allows direct detection of many biological and chemical materials. Bacteria are found in the human body naturally non-pathogenic and pathologically, as they are found in other living organisms. One of these bacteria is Escherichia coli (E. coli) which are found in the human body in its natural and pathogenic form. E.coli bacteria cause many diseases, including Stomach, intestines, urinary system infections, and others. The aim of this study: is sensing and differentiation between normal flora and pathogenic E.coli. Material and method: The optical biosensor constructed of a multi-mode – no core- multi mode optical fibre that differentiates between pathogenic and non-pathogenic bacteria of E.coli by measuring the changing for light intensity using source of light 410nm laser diode. Multi-mode - no core - multi-mode optical fibre (MM-NOC-MM) connected to the OSA analyser (HR2000) by means of an adapter and finally connected to a computer to show the results. Results: The intensity of the transmitted light recorded in the case of pathogenic bacteria is less than the intensity of the transmitted light recorded in the case of non-pathogenic bacteria. Conclusion: these results were obtained because of the ideal and better choice of the wavelength of the laser used with its absorption E.coli bacteria.
To date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreOily wastewater is one of the most challenging streams to deal with especially if the oil exists in emulsified form. In this study, electrospinning method was used to prepare nanofiberous polyvinylidene fluoride (PVDF) membranes and study their performance in oil removal. Graphene particles were embedded in the electrospun PVDF membrane to enhance the efficiency of the membranes. The prepared membranes were characterized using a scanning electron microscopy (SEM) to verify the graphene stabilization on the surface of the membrane homogeneously; while FTIR was used to detect the functional groups on the membrane surface. The membrane wettability was assessed by measuring the contact angle. The PVDF and PVDF / Graphene membranes efficiency
... Show MoreWater pollution as a result of contamination with dye-contaminating effluents is a severe issue for water reservoirs, which instigated the study of biodegradation of Reactive Red 195 and Reactive Blue dyes by E. coli and Bacillus sp. The effects of occupation time, solution pH, initial dyes concentrations, biomass loading, and temperature were investigated via batch-system experiments by using the Design of Experiment (DOE) for 2 levels and 5 factors response surface methodology (RSM). The operational conditions used for these factors were optimized using quadratic techniques by reducing the number of experiments. The results revealed that the two types of bacteria had a powerful effect on biodegradable dyes. The regression analysis reveale
... Show MoreNeonatal sepsis refers to the bacterial bloodstream infections of the newborn during the neonatal period as usually the first twenty-eight days of life. The current study was done in the laboratories of AL-Batool Teaching Hospital for Gynecology and Pediatrics in Baqubah, Diyala Governorate, including 140 blood specimens collected from the neonates admitted to the hospital with suspected sepsis, the ages of the both groups was ranged from 1 day to 28 days. Out of the total cultured samples, 32.14% (45 of 140) were positive and 67.86% (95 of 140) were negative blood culture. 45 of 140 samples were negative to the blood culture chosen as control group. The results showed highest isolates were Coagulase Negative Staphylococcus (CoNS) 19 (42.2%
... Show MoreOmentin (or intelectin) is a main visceral fat secretory adipokine. There is a growing interest to link omentin, obesity and co-morbidity factors. The aim of the present study is to evaluate serum omentin and its association to insulin resistance biomarkers, lipid profile and atherogenic indies. This cross – sectional study was conducted in Obesity Research and Therapy Unit-Alkindy College of Medicine by recruiting (115) individuals; 49 males /66 females. Subjects between (20 to 60) years of age were selected and classified into two groups according to their Body mass index (BMI). Group1 involved healthy lean volunteers (25 male/ 36 female; BMI 18.5 - 24.9). Group2 involved obese subjects; (24 male / 36 female with BMI ≥ 30). The s
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show More