In this part of programme , different bacterial isolates mainly Salmonella spp, Shigella spp and Escherichia coli were used for antagonism with Saccharomyces boulardii under different conditions . S.boulardii was grown under aerobic conditions and antagonized with young overnight nutrient broth cultures of test bacterial isolates and other kept in refrigerator for a week after full growth . Young cultures were more susceptible to antagonistic effect of yeast compared to old cultures and on isolates grown on solid medium for 24 hr. S.boulardii grown under aerobic and microaerobic conditions and antagonized with overnight broth cultures of test bacterial isolates , The results revealed that aerobic cultures of yeast had more inhibitory effect on test isolates .Concentration of yeast cells from liquid media GS( prepared from soluble fraction of gluten and mixed with equal volume of corn steep water and GS2%) was found not to be exceeded 109 yeast cell/ ml of suspension due to the large size of yeast cells .Effect of freezing on viability of yeast cells grown in GS and GS2% was negligible and there was no significant differences since the difference was less then half log cycle
The main objective of this study is to examine the impact of moisture concrete of clayey soil on the concrete slabs placed directly over it. This experimental study presents the mechanical properties of the concrete slab when placed on different clayey soil moisture content ranging from 0% to the optimum moisture content of 35%. The tests were performed on soil concrete specimens of 25*30*50 mm exposed to sprayed water curing conditions for 28 days. Tests of compressive strength, ultrasonic pulse velocity, crack depth and crack width were investigated through this paper. An ejection relationship between compressive strength of concrete and water content in the soil was observed, with a 26% increase with water increasing from 0% to 35%. T
... Show MoreAn extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show MoreThis study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg
... Show MoreA time series analysis can help to observe the behavior of the system and specify the system faults. In addition, it also helps to explain the various energy flows in the system and further aid in reducing the thermodynamic losses. The intelligent supervisory LabVIEW software can monitor the incoming data from the system by using Arduino microcontroller and calculates the important parameters. Energy, exergy, and anergy analysis present in this paper to investigate the system performance as well as its components. To accomplish this, a 4-ton vertical split air conditioner based on vapor compression refrigeration cycle charged with refrigerant R-22 was modified for experimental analysis. The results showed that during 540
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More