The plant Zizyphus spina-christa grows wildly in the middle and southern of Iraq locally named Nabag. In this study the antibacterial activity of several different plant extract (alcoholic hot and cold extract 80%, aqueous hot and cold extract) was tested against some gram negative bacteria that related to Enterobacteriacea as follow; Pseudomonas aeruginosa, Escherchia coli Proteus mirabilis, Serratia mercesence,. Aeromonas sp, Klebsiella pneumoniae ,Shigella sp, Salmonella enteritidis (134), S. typhi(97), S. typhimurium (300) , S. typhi, . The results showed that efficient method of extract was alcoholic hot extract from other extract methods that are used in this study. The detection of active compound in crude extracts of the leaves show
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative , flowery growth , yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1= cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses)
... Show MoreThis paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More
Strengthening of the existing structures is an important task that civil engineers continuously face. Compression members, especially columns, being the most important members of any structure, are the most important members to strengthen if the need ever arise. The method of strengthening compression members by direct wrapping by Carbon Fiber Reinforced Polymer (CFRP) was adopted in this research. Since the concrete material is a heterogeneous and complex in behavior, thus, the behavior of the confined compression members subjected to uniaxial stress is investigated by finite element (FE) models created using Abaqus CAE 2017 software.
The aim of this research is to study experime
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More