Background: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa that produce melanin and extraction of melanin. Synthesis and characterization silver nanoparticle and study of the antimicrobial activity of silver nanoparticles in the presence of melanin against UTI pathogens. Materials and methods: The samples swab inoculated on cetrimide agar as selective media and incubated aerobically for 24 hours at 37 °C. Used nutrient agar with nutrient broth supplement with 1% tyrosine for screening for melanin production by P. aeruginosa isolates,silver nanoparticles synthesis from P. aeruginosa was done according to biological method and was characterized with AFM, UV-Visible, XRD, FTIR and FE-SEM. Agar well diffusion method was used to examine the effect of combination against UTI pathogens. Results: The synergistic effects of AgNPs and melanin were evaluated to compare between the two treatments (silver nanoparticles alone and combination of silver nanoparticles and melanin). The results revealed that the combination showed the highest antimicrobial activity in compare with silver nanoparticles alone.
The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreABSTRACT:. The Lower Cretaceous Zubair formation is comprised of sandstones intercalated with shale sequences. The main challenges that were encountered while drilling into this formation included severe wellbore instability-related issues across the weaker formations overlaying the reservoir section (pay zone). These issues have a significant impact on well costs and timeline. In this paper, a comprehensive geomechanical study was carried out to understand the causes of the wellbore failure and to improve drilling design and drilling performance on further development wells in the field. Failure criteria known as Mogi-Coulomb was used to determine an operating mud weight window required for safe drilling. The accuracy of the geomechanical
... Show MoreIn this paper, we introduce and study a new concept (up to our knowledge) named CL-duo modules, which is bigger than that of duo modules, and smaller than weak duo module which is given by Ozcan and Harmanci. Several properties are investigated. Also we consider some characterizations of CL-duo modules. Moreover, many relationships are given for this class of modules with other related classes of modules such as weak duo modules, P-duo modules.
Zubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump
... Show More