Bacteriocin is an important antimicrobial peptide that can be used in industrial and medical fields due to its characteristics of antibacterial, food preservation and anticancer activities. Fifty isolates of Bacillus sp were collected from different soil samples which were already recognized via morphological and biochemical identification process. The isolates were screened for bacteriocin production effective against Staphylococcus spp in order to select the highest producing isolate. The isolate NK16 showed the maximum bacteriocin production (80 AU/ml) which was further characterized as Bacillus subtilis NK 16 through using API identification system (API 20E and API 50CHB). Then, next step was to detect the optimal conditions for maximum
... Show MoreSevere periodontitis is ranked as the sixth most prevalent disease affecting humankind, with an estimated 740 million people affected worldwide. The diagnosis of periodontal diseases mainly relies upon assessment of conventional clinical parameters. However, these parameters reflect past, rather than current, clinical status or future disease progression and, likely, outcome of periodontal treatment. Specific and sensitive biomarkers for periodontal diseases have been examined widely to address these issues and some biomarkers have been translated as point-of-care (PoC) tests. The aim of this review was to provide an update on PoC tests for use in the diagnosis and management of periodontal diseases. Among the PoC tests developed so
... Show MoreThe simulation study has been conducted for the harmonics of Nd: YAG laser, namely the second harmonic generation SHG, the third harmonic generation THG, and the fourth harmonic generation FHG. Determination of beam expander's expansion ratio for specific wavelength and given detection range is the key in beam expander design for determining minimum laser spot size at the target. Knowing optimum expansion ratio decreases receiving unit dimensions and increases its performance efficiency. Simulation of the above mentioned parameters is conducted for the two types of refractive beam expander, Keplerian and Galilean. Ideal refractive indices for the lenses are chosen adequately for Nd: YAG laser harmonics wavelengths, so that increasing transm
... Show MoreForeign body embolization is a rare but serious iatrogenic complication that might necessitate transcatheter or even surgical retrieval. A broken double-lumen catheter was snared using a goose neck snare kit. The procedure was successful, and the patient experienced no further complications.
In this study, two types of local plants were chosen, the first is the plant golden pothos Epipremnum aureum and the second is the Iraqi Sheikh's chin plant Tribulus terrestris L, for the purpose of making a comparison between them in terms of their possession of chemical groups with antioxidant activity in order to use them as a natural alternative to using antioxidants Industrial that cause negative effects on human health, the samples were prepared using the method of water and alcohol extraction (ethanol 70%) for both plants. It revealed the presence of a number of chemical groups (tannins, carbohydrates, phenols, flavonoids, alkaloids) for both plants, the aqueous and alcoholic extracts. Coumarins are only found in the sheikh's chin pl
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More