Ten isolates of Klebsiella pneumoniae, seven isolates of Pseudomonas aeruginosa and nine isolates of Staphylococcus aureus, were obtained from 100 urine samples collected from Baghdad hospitals. All isolates were identified biochemically and confirmed by using VITEK 2 and were then tested for their susceptibility towards 6 antibiotics and for phenolic extracts of Thymus vulgaris and Cinnamomum cassia. All bacteria were greatly affected by T. vulgaris, especially K. pneumoniae. Viable count was performed, it was noted that the number of bacterial cells reduced from 1×108 CFU to 1.2× 103, 2×105 and 1.8×106CFU of K. pneumoniae,
... Show MoreBeyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreOptimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall publishing cost. This study proposes and investigates a multi-level optimization algorithm based on Binary Particle Swarm Optimization (BPSO). It aims to an optimal multi-floor AP placement with effective coverage that makes it more capable of supporting QOS and cost effectiveness. Five pairs (coverage, AP placement) of weights, signal threshol
Let M be a R-module, where R be a commutative ring with identity, In this paper, we defined a new kind of module namely ET-hollow lifting module, Let T be a submodule of M, M is called ET-hollow lifting module if for every sub-module H of M with
Factor and cluster analysis, two multivariate statistical approaches, have been used to analyze temporal and spatial variations and pollutants sources effecting the water quality of Tigris River from the north to the south of Baghdad city. From October 2021 to September 2022, 15 water quality parameters (electrical conductivity (EC), pH, water temperature (WT), turbidity (Tur), total hardness (TH), biochemical Ooxygen Ddemand (BOD), dissolved oxygen (DO), Mg+, Ca+, SO4, dissolved solids (TDS), total suspended solids (TSS), total chlorine (TC), Cr, and Al) were tested at five monitoring sites (Balad, Al-Ghrai’at, Al-Shuhada'a Bridge, Al-Za’franiya, and Jisr Diyala), along the study area of the river. Results revealed that the
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, concep
... Show MoreFemale reproductive aging is a normal phase of life that eventually leads to menopause and reproductive senescence. The current experimental investigation was intended to study zinc supplementation effects on early embryonic development and neonates in 26-28 weeks old female mice. In this investigation, 80 mature female mice were used that were divided into two groups of forty each. Two control groups received distilled water, while two Zn groups were given 0.115 mg/kg/day Zn orally daily during 2-3 estrous cycles. The female mice were all mated with adult males. Twenty female mice from both the control and Zn groups were euthanized by CO2 gas inhalation, and then a longitudinal incision in the abdomen of each female
... Show MoreThe aim of our work is to develop a new type of games which are related to (D, WD, LD) compactness of topological groups. We used an infinite game that corresponds to our work. Also, we used an alternating game in which the response of the second player depends on the choice of the first one. Many results of winning and losing strategies have been studied, consistent with the nature of the topological groups. As well as, we presented some topological groups, which fail to have winning strategies and we give some illustrated examples. Finally, the effect of functions on the aforementioned compactness strategies was studied.
Colorectal Cancer (CRC) is a global medical problem that has a high rate of mortality. Interestingly, evaluating the hematopoietic growth factors is useful in the early diagnosis of CRC. Henceforth, this study was designed to measure the potential role of Granulocyte-macrophage colony-stimulating factor (GM-CSF) and Interleukin 3 (IL-3) in CRC progress and their relation to P53 expression and global DNA methylation (5mC). Blood samples were collected from a total of 60 Iraqi patients who participated in this study and were diagnosed with CRC, and from 30 healthy volunteers who served as control for comparison purposes. Serum levels of GM-CSF and IL-3 were assessed quantitatively using enzyme linked immunosorbent assay (ELISA).
... Show MoreIn this work, solid random gain media were fabricated from laser dye solutions containing nanoparticles as scattering centers. Two different rhodamine dyes (123 and 6G) were used to host the highly-pure titanium dioxide nanoparticles to form the random gain media. The spectroscopic characteristics (mainly fluorescence) of these media were determined and studied. These random gain media showed laser emission in the visible region of electromagnetic spectrum. Fluorescence characteristics can be controlled to few nanometers by adjusting the characteristics of the host and nanoparticles as well as the preparation conditions of the samples. Emission of narrow linewidth (3nm) and high intensity in the visible region (533-537nm) was obtained.
Increasingly, the availability of personal genomic data in cloud servers hosted by hospitals and research centers has incentivized researchers to turn to research that deals with analyzing genomic data. This is due to its importance in detecting diseases caused by genetic mutations, detecting genes that carry genetic diseases, and attempting to treat them in future generations. Secure query execution on encrypted data is considered an active research area in which encryption is used to ensure the confidentiality of genomic data while restricting the ability to process such data without first decrypting it. To provide a secure framework and future insight into the potential contributions of homomorphic encryption to the field o
... Show MoreImage fusion is integrating multiple images from many sources and changing them into a single image with clearer and more accurate information. Image fusion techniques have been proposed to enhance distorted input images using a smooth filter to improve the clarity of distorted images. This work fused images resulting from smooth filters (half left and half right) with size windows of (3×3), (5×5), (7×7), (9×9), and (11×11) pixels. The image resulting from the smooth filter towards the right was combined with the image from the smooth filter towards the left using traditional techniques such as addition, multiplication, and new suggested techniques, namely absolute real standard deviation, binary standard deviation, real covariance,
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show Moreخلٌقت مشتقات الجديدة من4-methyl-7-ethylcoumarin التي تحمل مجموعة azo من خلال سلسلة من التفاعلات المتسلسلة واختبار نشاطها البيولوجي. بدءًا من 7-اثيل-4-مثيل كومارين الذي حضٌر من تفاعل ميتا اثيل فينول مع اثيل اسيتو اسيتيت بواسطة تفاعل بكمان بعدها تم نيترة 7-اثيل-4-مثيل كومارين باستخدام حامض النيتريك بوجود H2SO4المركز لإنتاج ايزومر واحد 7-اثيل-4-مثيل -8-نايتروكومارين تحت التبريد في درجة حرار Co (2-5) ، ثم اختزال
... Show Moreتمت دراسة الزوج المجري Sip-39 باستخدام طرق القياس الضوئي والطيفي. البيانات الرصدية اخذت من اصدار البيانات السابع عشر (DR17) من "Sloan Digital Sky Survey (SDSS)" وتمت عمل ال fitting لصور المجرتين باستخدام برنامج (IRAF) من خلال المكتبةSTSDAS باستخدام ELLIPS task.تم دراسة وحساب كل من اللمعان السطحي للمجرتين في الزوج ، بالإضافة إلى الانبعاث الكلي ، وشكل القطع الناقص ، وزوايا انحراف المحور الكبير، الانحرافات العمودية والأفقية ، ومعاملا
... Show MoreModern education incorporates strong elements of collaborative learning: activities that prompt students to collaborate on completing learning tasks. In this work we investigate the relationship between media type and student collaboration and attribution patterns during collaborative content creation. We run similarity analyses on text and video artifacts submitted by students as part of collaborative exercises in an undergraduate module. Our main finding is that the same cohort of students was significantly more likely to attribute non-original content to its sources when authoring text compared to video content and when this content is not produced by a peer student. Our preliminary results based on only two media suggest that media type
... Show Moreفي هذا البحث تم دراسة تأثير متغير الدوران والمتغيرات الأخرى على التدفق التمعجي لسائل سوتربي في قناة غير متماثلة مائلة تحتوي على وسط مسامي مع انتقال الحرارة. في وجود الدوران، تم تطوير النمذجة الرياضية باستخدام المعادلات الاساسية القائمة على نموذج سائل سوتربي. في تحليل التدفق، يتم استخدام افتراضات مثل تقريب طول الموجة الطويلة وانخفاض عدد رينولدز. تم حل المعادلة التفاضلية الاعتيادية غير الخطية الناتجة تحليل
... Show MoreLet
تم تصنيف ترسة الفرات ملساء الصدفة Rafetus euphraticus على أنها مهددة بخطر الانقراض ضمن القائمة الحمراء للاتحاد الدولي لحفظ الطبيعة، ويُعتقد أنها تعرضت لانخفاض كبير في أعدادها مؤخرًا. تقتصر معلومات الأنواع في العراق على عدد قليل من المسوحات السريعة مع القليل من المعلومات التفصيلية عن التربية والتوزيع. هدفت الدراسة الى تقدير اعداد سلاحف الفرات ملساء الصدفة في الأهوار الوسطى باستخدام استقراء بسيط للعدد.
... Show MoreThe BEK family of flows have many important practical applications such as centrifugal pumps, steam turbines, turbo-machinery and rotor-stator devices. The Bödewadt, Ekman and von Kármán flows are particular cases within this family. The convective instability of the BEK family of rotating boundary-layer flows has been considered for generalised Newtonian fluids, power-law and Carreau fluids. A linear stability analysis is conducted using a Chebyshev collocation method in order to investigate the effect of shear-thinning and shear-thickening fluids for generalised Newtonian fluids on the convective Type I (inviscid crossflow) and Type II (viscous streamline curvature) modes of instability. The results reveal that shear-thinning power-law
... Show MoreWe observed strong nonlinear absorption in the CdS nanoparticles of dimension in the range 50-100 nm when irradiant with femtosecond pulsed laser at 800 nm and 120 GW/cm 2 irradiance intensity. The repetition rate and average power were 250 kHz and
Coronavirus is an RNA (Ribonucleic acid) virus in the coronaviridian family that causes zoonotic and infectious diseases transmitted between animals and evolved between humans. This class of pathogens is responsible for respiratory diseases. Coronavirus refers to the crown-like protrusions on the outside surface of the virus. Corona is an infection that causes breathing difficulties in humans. In epidemics, symptomatic techniques based on graphic design are essential for examining the causes of influence, which leads to better results than primary radioscopy mechanisms for identifying and diagnosing COVID-19 cases. The urgent need to employ artificial intelligence in disease detection arose from this standpoint. In this paper, a system i
... Show More