The work include synthesis of nanocomposites (X / S / Ag) based on blend from Xanthan gum / sodium alginate polymers (X / S) with different loading of synthesized silver nanoparticales (0.01, 0.03 and 0.05 wt%) were added to the blend. The silver nanoparticles were prepared by reduction method and were characterized and analyzed using X-ray diffraction (XRD) and Atomic force microscope (AFM). XRD study showed the presence nanoparticle of silver with crystalline nature and face-centered cubic (FCC) structure and an average size of nanoparticles ranging from 32 to 37 nm. The surface study was performed using AFM which showed a fairly uniform shape to the nanocomposites and a spherical nature for the silver nanoparticles. The nanocomposite exhibited increase in the thermal stability and as well (X / S /0.05 Ag) nanocomposite film showed superior antimicrobial activity against Proteus, Basileus cyrus, Ecole, staph, pseudomonas, and Basilus subtilius.
In this study, we design narrow band pass filter for window (3_5) ?m dependent on the needle optimization method , and a comparison with global designs published -Also, the effect of change parameter design on the optical performance of filter was studded and being able to overcome the difficulties of the design.In this study, the adoption of homogeneous optical properties materials as thin film depositing on a substrate of germanium at wavelength design (? = 4 ?m). For design this kind of filters we used advanced computer program (Matlab )to build a model design dependent both matrix characteristic and Needle technique. In this paper we refer to the type of Mert function , which is used for correct optical performance acces
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreThis paper signifies the contradictory point of view in John Clare’s poetry. Clare (1794-1864) is an English romantic poetry in the nineteenth century, who writes more than ten volumes about nature. So, this study highlights the concept of Psychoanalytic theory which is ‘ambivalence’ and how through this theory can interpret any literary text on the basis of utilizing psychoanalytic methods to literary texts in order to reveal the author's inner emotions such as motives, dreams, as well as wishes. Consequently, the concept of ‘ambivalence’ has a lot in common with the human psyche and its struggles. Sometimes the reader finds the author/poet talking about something real or a notion with pleasant sentiments
... Show MoreBackground Non specific colitis is defined as inflammatory condition of the colon that when examined microscopically lacks any characteristic features of any specific form of colitis and is commonly seen in reports of colonoscopy biopsies. There are many factors that cause it like obesity and H pylori.
Aim of the study To determine the association of obesity and H pylori as contributory factors to this disease.
Patients and methods This is a case-controlled study was carried out in Al-Kindy College of Medicine from January 2017 to June 2018. Sixty individuals were included; forty of them had non specific colitis. The rest were hea
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe denoising of a natural image corrupted by Gaussian noise is a problem in signal or image processing. Much work has been done in the field of wavelet thresholding but most of it was focused on statistical modeling of wavelet coefficients and the optimal choice of thresholds. This paper describes a new method for the suppression of noise in image by fusing the stationary wavelet denoising technique with adaptive wiener filter. The wiener filter is applied to the reconstructed image for the approximation coefficients only, while the thresholding technique is applied to the details coefficients of the transform, then get the final denoised image is obtained by combining the two results. The proposed method was applied by usin
... Show MoreThe research deals with an important detail of the joints of the film industry and television drama, which is the expression and aesthetic of the long shot, after being popularized by some directors, and that the long shot has been employed since the beginning of the cinema. But the research addresses the contemporary film and how the long shot worked. The researcher identified her goal in identifying the aesthetic and expressive of the long shot in the contemporary film, and then defined the term of the shot and the long shot.
The theoretical framework was based on two topics: the first (aesthetic and artistic expression in cinema) and the second (the long shot and the state of its construction). The researcher then chose LA LA LAND
ZM Al-Bahrani, Medico Legal Update, 2021
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreAbstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show More