Posible interference of vamin with the activity of several antibiotics against E. coli was evaluated in vitro. In MBS- glucose medium, significant growth delay was induced by 8 ug/ml of terramycin (oxytetracycline- polymyxin B) and bactrim (trimethoprim-sulphamethoxazole), and by 16 ug/ml of refocin, lincomycin, and chloramphenicol. Rapid growth inhibition was induced by 32 ug/ml of all an- tibiotic tested separately. Significant inactivation of up to 64 ug/ml of licomycin and bactrim was in- duced by the addition of vamin at a concentration of 1:20 v/v of the medium. This effect was found to be due to the presence of specific amino acids in vamin. Among them is valine, leucine, isoleucine tyrosine, tryptophan, phenylalanine, cysteine, meth
... Show MoreVarious nutritional solutions given to patients contain amino acids. Possible interference of this supplementation with selected aminoglycoside antiboiotics, namely gentamycin and streptomycin was evaluated in vitro. In minimal medium, E.coli was inhibited by gentamycin and by streptomycin. Circumvention of this inhibition was obtained with a mixture of 20 amino acids in the medium. Deletion of amino acids revealved that circumvention. specific amino acids were required for such Deletion of the aromatic amino acids or cysteine abolished the protection against gentamycin and streptomycin, while the deletion of the branched chain amino acids abolished the protection against streptomycin only. Thereonine, on the other hand, appears to be essen
... Show MoreABSTRACT Possible interference of vamin nutritional solution with the activity of several B-lactam antibiotics against E.coli was evaluated in vitro.In Minimal basal salts-glucose medium rapid growth inhibition of sensitive E. coli was induced by 4 µg/ml of ampicillin / cloxaillin, 8 µg/ml of ampicillin, 6 µg/ml of carbencillin, hostacillin, and cephalotin, and by 32 µg/ml of penicillin G and cloxacillin. Significant inactivation of up to 32 µg/ml of carbencillin, cephalotin, penicillin G, and hostacillin was induced by addition of 1:20 v/v vamin. This inactivation was due to the presence of specific amino acids in the mixture. Deletions of amino acids revealed that valine, leucine, isoleucine, tyrosine, tryptophan, phenylalanine, cys
... Show More
The current research variables have received increasing attention in the recent period because they are one of the important issues affecting the future of organizations, as a result of the speed of environmental variables that have greatly affected organizations and for the purpose of explaining the relationships and links between research variables, as this research presents a test "the type and direction of the relationship between strategic foresight capabilities As an independent variable and green creativity "as a respondent variable. A set of questions has arisen about the basic research problem, including what is the nature and level of interest in the research variables (strategic foresight capabilities an
... Show MoreThe objective of this study is to test In Vitro the twenty chemical compounds that contains Schiff base or oxazepine, indoline, imidazolo units in concentrations( 50, 100, 150) mg / dl as antifungal activity, against three pathogenic Candida species that occur in humans. We tested one isolates of
) Candida albicans ,Candida glabrata and Candida krusei). All these species affect human health . The study was carried out in the Laboratory of Public Health , directly of health for the period from May 2016 to April 2017 , Candida spp isolates used in this study were collected from patients admitted at some private c
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe gaps and cracks in an image result from different reasons and affect the images. There are various methods concerning gaps replenishment along with serious efforts and proposed methodologies to eliminate cracks in diverse tendencies. In the current research work a color image white crack in-painting system has been introduced. The proposed inpainting system involved on two algorithms. They are Linear Gaps Filling (LGF) and the Circular Gaps Filling (CGF). The quality of output image depends on several effects such as: pixels tone, the number of pixels in the cracked area and neighborhood of cracked area and the resolution the image. The quality of the output images of two methods (linear method: average Peak Signal to Noise Ratio (PS
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show More