The study showed that all extracts (aqueous, ethanolic and acetonic) of the leaves of Eucalyptus and Myrtus plants had a inhibitory effect on the growth of all types of yeasts studied, acetone extract recorded the highest inhibition of yeastat 100ppm concentration,The inhibition was 35mm, 34mm, 24mm and 20mm for Candida parapsilosis, Candida glabrata, Candida tropicalis and Candida albicans respectively, The experiments above showed the least significant differences at 0.05 level.The results ofE. Cammldulensis ethanolic tincture analysis has shown the presence of 44 biologically active substances. The main Eucalyptus leaves component was: 2-Bicyclo (2-2.1) heptanol (12.37%), Ledol (8.23%),1,2,4- Benzenetriol (8.45%) and that contain spathul
... Show MoreThis research studies the effect of addition of some nanoparticles
(MgO, CuO) and grain size (30,40nm) on some physical properties
(impact strength, hardness and thermal conductivity) for a matrix
blend of epoxy resin with SBR rubber. Hand –Lay up method was
used to prepare the samples. All samples were immersed in water for
9 weeks.
The Results showed decreased in the values of impact strength and
hardness but increased the coefficient of thermal conductivity.
The current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.
The exchange rate is of great importance at the global and local levels alike, as this importance increases with the increasing rates of development of economic relations between countries of the world due to openness and integration into the global economy, expressed by the expansion of the volume of trade and financial relations between countries. The Central Bank of Iraq has set the need to stabilize this price as a goal to reduce inflation rates and reduce them to the internationally accepted rates by using the foreign currency sale window to achieve a balance between the forces of supply and demand for foreign currency and to preserve the value of the Iraqi dinar. The research concluded that the central bank was It has a maj
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More