A total of 37 Staphylococcus epidermidis isolates, isolated from corneal scraping of patients with bacterial keratitis and 20 isolates from healthy eyes (as control) (all isolates, isolated from, Ibn Al- Haietham eye hospital / Baghdad), were tested for slime production, 52.63% of all isolates were positive-slime production (23 isolates from patients and 7 isolates from controls). It was found that positive-slime producing S. epidermidis were exhibited a high resistance to antibiotics as compared to negative-slime producing isolates.
A new set of metal complexes by the general formula [M(C)2(H2O)2]Cl2 has been prepared through the interaction of the new Ligand [N1, N4-bis(4-chlorophenyl)succinamide] (C) derived from succinyl chloride with 4-Chloroaniline with the transition metal ions Mn(II), Co(II), Ni(II), Hg(II), Cu(II) and Cd(II). Compounds diagnosed by TGA, 1 H, 13CNMR and Mass spectra (for (C)), Fourier-transform infrared and Electronic spectrum, Magnetic measurement, molar conduct, (%M, %C, %H, %N). These measurements indicate that (C) is associated with the metal ion in a bi-dentate fashion by nitrogen atoms (the amide group) and the octahedral composition of these complexes is suggested. The anti-bacterial action of the compounds towards three types of bacteria
... Show MoreIn this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreCopper oxide (CuO) nanoparticles were synthesized through the thermal decomposition of a copper(II) Schiff-base complex. The complex was formed by reacting cupric acetate with a Schiff base in a 2:1 metal-to-ligand ratio. The Schiff base itself was synthesized via the condensation of benzidine and 2-hydroxybenzaldehyde in the presence of glacial acetic acid. This newly synthesized symmetric Schiff base served as the ligand for the Cu(II) metal ion complex. The ligand and its complex were characterized using several spectroscopic methods, including FTIR, UV-vis, 1H-NMR, 13C-NMR, CHNS, and AAS, along with TGA, molar conductivity and magnetic susceptibility measurements. The CuO nanoparticles were produced by thermally decomposing the
... Show MoreObjective: Using green chemistry, an effective, inexpensive, and environmentally safe method, sulfur nanoparticles with specific properties can be prepared and used in nanotechnology. This research aimed to prepare sulfur nanoparticles from chilli pepper extract and determine their effectiveness against colon cancer. Method: Chilli pepper extract obtained from local markets was treated with aqueous sodium thiosulfate (Na2S2O7.5H2O). After mixing, it was continuously stirred, heated, and filtered. NaBH4 was then added, resulting in a yellow precipitate. The precipitate was centrifuged, purified, and dried at 250°C. Results: Standardised tests such as UV-Vis, XRD, SEM, TEM, AFM, and EDX were used, resulting in sulfur nanoparticles with an av
... Show MoreFace recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreThe present study aimed to identify the therapeutic evaluation of chitosan extracted from the fungus cushroom and pure chitosan on glucose and lipid profile in the blood of 35 male rabbits with hyperlipidemia induced experimentally by cholesterol. The tests included estimation of glucose levels, total cholesterol, triglycerides, high-density lipoproteins, low-density lipoproteins, and very low-density lipoproteins. hyperlipidemia was induced in the male rabbits used in the study which was administered orally with cholesterol 150mg/kg body weight for a week. rabbits were divided into seven groups: control, cholesterol, pure chitosan, mushroom chitosan, cholesterol and pure chitosan, cholesterol and mushroom chitosan and cholestero
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja