In this study, the investigation of Local natural Iraqi rocks kaolin with the addition of different proportions of bauxite and its effect on the physical and mechanical properties of the produced refractories was conducted. Kaolin/bauxite mixture was milled and classified into various size fractions, the kaolin (less than 105 μm) and the bauxite (less than 70μm). The specimens were mixed from kaolin and bauxite in ranges B1 (95+5)%, B2 (90+10)%, B3(85+15)%, and B4 (80+20)% respectively. The green specimens were shaped by the semi-dry method using a hydraulic press and a molding pressure of 7 MPa with the addition of (9-12) %wt. of PVA ratio. After molding and drying, the specimens were fired at (1100, 1200 and 13
... Show MoreThis study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreBackground: Malaria remains a leading cause of mortality in sub-Saharan Africa (including Sudan). C-reactive protein (CRP) is useful as a marker of severity in malaria. African studies have shown that serum CRP levels correlate with parasite burden and complications in malaria, especially falciparum. However, there are no data on CRP levels in Sudanese malaria patients.
This study aims to evaluate the association between CRP levels with comorbidities, species, and complications of severe malaria
Subjects and Methods: A cross-sectional study enrolled 65 severe malaria patients at Khartoum state hospitals during the period from April to June2021. Manifestations of severe
... Show MoreMan always reacts by employing data that he lives inside Artworks and he tries to make them an ideal speech that shows the most important intellectual trends to which he belongs, as it happened in the formal building of the ancient arts . Mesopotamia is one of the civilizations that interacted with the intellectual legibility transforming into visual symbols, so it is difficult for the researcher to interpret these symbols without considering the nature of these civilizations in general .
This current search aims to identify similarities and differences in the recruitment of cultural shapes between the works of the sculptors (Mohammed Ghani Hikmat and Murtada Haddad) .
Researcher adopted an approach of analytical description of the
This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More