Preferred Language
Articles
/
Uhajt4kBVTCNdQwCoIzr
The Antimicrobial Activity of Melanin-Mediated Synthesis of Silver Nanoparticles
...Show More Authors

Background: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa that produce melanin and extraction of melanin. Synthesis and characterization silver nanoparticle and study of the antimicrobial activity of silver nanoparticles in the presence of melanin against UTI pathogens. Materials and methods: The samples swab inoculated on cetrimide agar as selective media and incubated aerobically for 24 hours at 37 °C. Used nutrient agar with nutrient broth supplement with 1% tyrosine for screening for melanin production by P. aeruginosa isolates,silver nanoparticles synthesis from P. aeruginosa was done according to biological method and was characterized with AFM, UV-Visible, XRD, FTIR and FE-SEM. Agar well diffusion method was used to examine the effect of combination against UTI pathogens. Results: The synergistic effects of AgNPs and melanin were evaluated to compare between the two treatments (silver nanoparticles alone and combination of silver nanoparticles and melanin). The results revealed that the combination showed the highest antimicrobial activity in compare with silver nanoparticles alone.

Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Iraqi Journal Of Agricultural Sciences مجلة العلوم الزراعية العراقية
EFFECT OF HARROW TYPE AND DRILL SEEDER'S SPEEDS AND DEPTHS ON SOME MACHINERY UNIT TECHNICAL, ECONOMICAL AND ENERGY REQUIREMENT INDICATORS تأثير نوع المنعمة وسٌرع وأعماق البذار في بعض المؤشرات الفنية والأقتصادية ومتطلبات القدرة للوحدة الميكنية
...Show More Authors

Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jun 23 2019
Journal Name
American Rock Mechanics Association
Using an Analytical Model to Predict Collapse Volume During Drilling: A Case Study from Southern Iraq
...Show More Authors

Zubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump

... Show More
View Publication
Publication Date
Fri Sep 01 2017
Journal Name
International Research Journal Of Engineering And Technology
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst

... Show More
Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Images of ruin in "Throne" and " Water stream" by Maysaloon Hadi and "War" by Glezio: A Compartive Study: Les images du débris dans "Le trône et le ruisseau " de Maysaloon Hadi et "La guerre" de Le Glézio (étude comparative)
...Show More Authors

Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today. 

Résumé

Notre recherche abord un des points inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Techniques مجلة التقني
A STUDY OF SOME TECHNICAL AND ECONOMICAL PARAMETERS FOR MACHINERY UNIT (NEW HOLLAND &DISC PLOW) BY USING THREE DIFFERENT TILT ANGLES دراسة بعض المؤشرات الفنية والأقتصادية للوحدة الميكنية (الجرار نيوهولاند مع المحراث القرصي الثلاثي القلاب) بأستخدام زوايا ميل مختلفة للأقراص
...Show More Authors

Publication Date
Mon Nov 20 2023
Journal Name
Journal For Research In Applied Sciences And Biotechnology
Article Review: Description Histology to Gastric Ulcer in Human
...Show More Authors

A recurrent condition that affects up to 10% of people worldwide is gastric ulceration illness. The existence of gastric juice pH with the lowering of mucous defences is prerequisites for the development of chronic ulcers. The main variables affecting the mucosa susceptibility to damage include Helicobacter pylori (H. pylori) infections or non-steroidal anti-inflammatory medicines (NSAIDs). Proton pump inhibitors (PPIs) including histamine-2 (H2) receptor inhibitors, two common therapies for peptic ulcers, have been linked to side impacts, recurrence or a variety of pharmacological combinations. Conversely, therapeutic herbs or the chemicals they contain may be used to cure or eliminate a wide range of illnesses. Therefore, prominent pharma

... Show More