Twenty bacterial isolates were identified as Staphylococcus aureus collected from wounds and catheters related infections. A capsulated S. aureus isolate was chosen after performing serum soft agar test, for this study Neutropenic mice were challenged with capsulated S. aureus ,and the effect of G-CSF with or without moxifloxacin was studied. The results indicated that the addition of G-CSF to moxifloxacin therapy have a synergistic effect in the killing of the bacteria, while when each G-CSF and moxifloxacin were used seperately have a similar effect on bacterial killing. It was found that the moxifloxacin has the same activity as G_CSF but is less costly than the latter one.
The importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply, It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .
Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of
... Show MoreMedia studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreIn this paper, we introduce the notion of Jordan generalized Derivation on prime and then some related concepts are discussed. We also verify that every Jordan generalized Derivation is generalized Derivation when is a 2-torsionfree prime .
-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to cl
... Show MoreAn Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification.
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreThe primary aim of this paper is to present two various standpoints to define generalized membership relations, and state the implication between them, in order to categorize the digraphs and assist for their gauge exactness and roughness. In addition, we define several kinds of fuzzy digraphs.