In this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv and investigated the role of ZnO NP-induced toxicity in the IC50 values of the HdFn cells. The findings reveal the ability chemical nanoparticles to inhibit, as well as of Gram-positive bacteria.
Elbow stiffness is hard to treat and commonly resulted from trauma or degenerative arthritis. This study aimed to demonstrate the effectiveness of using ultrasound therapy in management of stiff elbow joint resulted from several etiological factors. A total number of 42 patients (35 male and 7 female) allocated randomly from the Department of Physiotherapy at Al-yarmouk Teaching Hospital during 2013. Each patient examined physically by physiotherapist taking in consideration the measurement of the joint movement angle using goniometer in flexion and the extension, and the pain score using visual analogue scale (VAS). Ultrasound therapy initiated thrice weekly for two weeks. At the time of entry, the means degree of flexion and extension
... Show MoreAbstract: This paper presents the results of the structural and optical analysis of CdS thin films prepared by Spray of Pyrolysis (SP) technique. The deposited CdS films were characterized using spectrophotometer and the effect of Sulfide on the structural properties of the films was investigated through the analysis of X-ray diffraction pattern (XRD). The growth of crystal became stronger and more oriented as seen in the X-ray diffraction pattern. The studying of X-ray diffraction showed that; all the films have the hexagonal structure with lattice constants a=b=4.1358 and c=6.7156A°, the crystallite size of the CdS thin films increases and strain (ε) as well as the dislocation density (δ) decreases. Also, the optical properties of the
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
TiO2 thin films were deposited by Spray Pyrolysis with thickness ((350±25) nm) onto glass substrates at (350°C), and the film was annealed at temperatures (400 and 500)°C. The structural and morphological properties of the thin films (TiO2) were investigated by X-ray diffraction, Field emission scanning electron microscopy and atomic force microscope. The gas sensor fabricated by evaporating aluminum electrodes using the annealed TiO2 thin films as an active material. The sensitivity of the sensors was determined by change the electrical resistance towards NO2 at different working temperatures (200
Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More