In present days, drug resistance is a major emerging problem in the healthcare sector. Novel antibiotics are in considerable need because present effective treatments have repeatedly failed. Antimicrobial peptides are the biologically active secondary metabolites produced by a variety of microorganisms like bacteria, fungi, and algae, which possess surface activity reduction activity along with this they are having antimicrobial, antifungal, and antioxidant antibiofilm activity. Antimicrobial peptides include a wide variety of bioactive compounds such as Bacteriocins, glycolipids, lipopeptides, polysaccharide-protein complexes, phospholipids, fatty acids, and neutral lipids. Bioactive peptides derived from various natural sources like bacteria, fungi, and algae in higher eucaryotic animals offer novel possibilities to identify potential lead compounds for treating a variety of diseases. The antimicrobial activity, various properties, mechanisms, and applications of AMPs are the focus of this systematic study.
Games engagement has become one of the main concerns in game industry. Early study revealed that Malaysian digital traditional games are suffering with the same issue due to several factors. One of it is the lack of the game itself. Although many Malaysian traditional games have been digitized, none of them has incorporated rewards despite its importance in games engagement. Realizing the importance of rewards in games engagement, one of Malaysian traditional Congkak has been chosen to be enhanced by incorporating rewards. Experiments have been conducted among 50 gamers among the Millennials. Prior interview, game demo and human test are conducted. Experiments focused on the influence of rewards on games flow, games challenge, and its ef
... Show More
Photorefractive keratectomy (PRK) is the refractive technique that began with a physical scraping of the epithelial layer of cornea subsequent by laser treatment. Post this procedure to about 48 hours the removed epithelial layer regenerated to protect the eye again. The regeneration process (called re-epithelization) started from the limbus of the cornea toward the central part of it. The re-epithelization mechanism consists of a change in cell density (mitosis) and cell concentration (migration) with a velocity in two directions: radial and tangential. In the present study, an estimation for both radial (responsible for the overlapped layers toward the outward direction of the cornea) and tangential comp
... Show MoreObjective(s): The present study aims at identifying the Iraqi Colleges of Nursing Deans' leadership
behaviors effectiveness and faculty members' motivation towards work in these colleges.
Methodology: Descriptive design has been used for the sample survey manner, which is the
appropriate approach to the study of social phenomena in the field where provides data on the reality of
these phenomena and relations between the causes and consequences and an analysis of it and perhaps
the factors affecting it and how it appears. The study relies on a questionnaire to collect data from the
participants which is composed of (86) items distributed on three axes: First, the demographic
characteristics which are composed of (8) i
ان تصنيع رمال مطلية بأوكسيد الحديد من خلال ترسيب الجزيئات النانوية لذلك الاوكسيد على سطوح الرمال واستخدامها في الحاجز التفاعلي النفاذ لإزالة ايونات الكادميوم والنحاس من المياه الجوفية الملوثة الهدف الرئيسي للدراسة الحالية. تم توصيف بيانات الامتزاز نتيجة تفاعل المادة المازة مع المادة الممتزة قيد الدراسة بشكل جيد من خلال نموذج لانكمير والذي كان أفضل من نموذج فراندلش. لقد وجد ان اعلى قيم لقابلية الامتزاز با
... Show MoreBackground: Metabolic syndrome (Mets) is partially heritable. High mobility group AT-hook1 (HMGA1), an architectural transcription factor, affects the homeostasis of glucose. The marked inter-individual differences between T
... Show MoreAbstract
Binary logistic regression model used in data classification and it is the strongest most flexible tool in study cases variable response binary when compared to linear regression. In this research, some classic methods were used to estimate parameters binary logistic regression model, included the maximum likelihood method, minimum chi-square method, weighted least squares, with bayes estimation , to choose the best method of estimation by default values to estimate parameters according two different models of general linear regression models ,and different s
... Show MoreThe study objectives were to 1) explore the real-world experience of hospital pharmacists with the differences in effectiveness safety, and interchangeability between biosimilar medicines and their reference biological counterparts, 2) reveal pharmacist recommendations to enhance the safety of biopharmaceutical medicines in public hospitals.
The study has a mixed-method design where the core component was qualitative (interviews) and the supplemental component was quantitative (adverse drug reaction, ADR, reports). This qualitative component included semi-structured (mostly face-to-face) interviews involving hospital pharmacists from different hospitals with experience with biological or biosimilar medicines. The interviews were c
... Show MoreAbstract
This study cares for the economic living conditions in Mosul City. Its importance lies in the critical period that has been covered
(2002-2007), which was dominated by far–reaching events at political economic and social levels. Among the main results that have been revealed are the following: the rate of economic growth in the City has been the lowest among major urban centers in Iraq. Besides, real income per capita in the City has stayed stagnant during the period of the study. However, the inequality in distribution of income has decreased. The main bulk of the city's population rely on their income from wages and salari
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper