Background: Nowadays, the environmentally friendly procedures must be developed to avoid using harmful compounds in synthesis methods. Their increase interest in creating and researching silver nanoparticles (AgNPs) because of their numerous applications in many fields especially medical fields such as burn, wound healing, dental and bone implants, antibacterial, viral, fungal, and arthropodal activities. Biosynthesis of nanoparticles mediated pigments have been widely used as antimicrobial agent against microorganisms. Silver nanoparticles had synthesized by using melanin from locally isolate Pseudomonas aeruginosa, and used as antimicrobial activity against pathogenic microorganisms. Aim of the study: Isolation of Pseudomonas aeruginosa that produce melanin and extraction of melanin. Synthesis and characterization silver nanoparticle and study of the antimicrobial activity of silver nanoparticles in the presence of melanin against UTI pathogens. Materials and methods: The samples swab inoculated on cetrimide agar as selective media and incubated aerobically for 24 hours at 37 °C. Used nutrient agar with nutrient broth supplement with 1% tyrosine for screening for melanin production by P. aeruginosa isolates,silver nanoparticles synthesis from P. aeruginosa was done according to biological method and was characterized with AFM, UV-Visible, XRD, FTIR and FE-SEM. Agar well diffusion method was used to examine the effect of combination against UTI pathogens. Results: The synergistic effects of AgNPs and melanin were evaluated to compare between the two treatments (silver nanoparticles alone and combination of silver nanoparticles and melanin). The results revealed that the combination showed the highest antimicrobial activity in compare with silver nanoparticles alone.
ABSTRACT:. The Lower Cretaceous Zubair formation is comprised of sandstones intercalated with shale sequences. The main challenges that were encountered while drilling into this formation included severe wellbore instability-related issues across the weaker formations overlaying the reservoir section (pay zone). These issues have a significant impact on well costs and timeline. In this paper, a comprehensive geomechanical study was carried out to understand the causes of the wellbore failure and to improve drilling design and drilling performance on further development wells in the field. Failure criteria known as Mogi-Coulomb was used to determine an operating mud weight window required for safe drilling. The accuracy of the geomechanical
... Show MoreThis paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreDeveloped countries are facing many challenges to convert large areas of existing services to electronic modes, reflecting the current nature of workflow and the equipment utilized for achieving such services. For instance, electricity bill collection still tend to be based on traditional approaches (paper-based and relying on human interaction) making them comparatively time-consuming and prone to human error.
This research aims to recognize numbers in mechanical electricity meters and convert them to digital figures utilizing Optical Character Recognition (OCR) in Matlab. The research utilized the location of red region in color electricity meters image to determine the crop region that contain the meters numbers, then
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MorePlagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical
... Show MoreIn computer vision, visual object tracking is a significant task for monitoring
applications. Tracking of object type is a matching trouble. In object tracking, one
main difficulty is to select features and build models which are convenient for
distinguishing and tracing the target. The suggested system for continuous features
descriptor and matching in video has three steps. Firstly, apply wavelet transform on
image using Haar filter. Secondly interest points were detected from wavelet image
using features from accelerated segment test (FAST) corner detection. Thirdly those
points were descripted using Speeded Up Robust Features (SURF). The algorithm
of Speeded Up Robust Features (SURF) has been employed and impl
An indirectly method is used to determine hydrogen peroxide. The method based on oxidation of chromium (III) ion by hydrogen peroxide in basic medium to form chromate ion which react with barium (II) ion to produce a yellow precipitate (BaCrO4). Under the optimum established conditions, the linear range of 0.50-25.00 mmol L-1 along with correlation coefficient (r) of 0.9992, Limit of detection (LOD) 0.68 μg / 100 μL, precision expressed as relative standard deviation for six replication measurements at 5.0 mmol.L-1 H2O2 of less than 2% were obtained for hydrogen peroxide. The developed method was successfully applied for the estimation of H2O2 in three pharmaceuticals preparation of different companies using continuous flow injection o
... Show MoreThis article discusses the estimation methods for parameters of a generalized inverted exponential distribution with different estimation methods by using Progressive type-I interval censored data. In addition to conventional maximum likelihood estimation, the mid-point method, probability plot method and method of moments are suggested for parameter estimation. To get maximum likelihood estimates, we utilize the Newton-Raphson, expectation -maximization and stochastic expectation-maximization methods. Furthermore, the approximate confidence intervals for the parameters are obtained via the inverse of the observed information matrix. The Monte Carlo simulations are used to introduce numerical comparisons of the proposed estimators. In ad
... Show MoreIn this paper, we introduce and study a new concept (up to our knowledge) named CL-duo modules, which is bigger than that of duo modules, and smaller than weak duo module which is given by Ozcan and Harmanci. Several properties are investigated. Also we consider some characterizations of CL-duo modules. Moreover, many relationships are given for this class of modules with other related classes of modules such as weak duo modules, P-duo modules.