This study included the isolation and identification of Aspergillus flavus isolates associated with imported American rice grains and local corn grains which collected from local markets, using UV light with 365 nm wave length and different media (PDA, YEA, COA, and CDA ). One hundred and seven fungal isolates were identified in rice and 147 isolates in corn.4 genera and 7 species were associated with grains, the genera were Aspergillus ,Fusarium ,Neurospora ,Penicillium . Aspergillus was dominant with occurrence of 0.47% and frequency of 11.75% in rice grains whereas in corn grains the genus Neurospora was dominant with occurrence of 1.09% and frequency 27.25% ,results revealed that 20 isolates out of 50 A. flavus isolates were able to produce aflatoxin .results also indicated that the best medium for toxin production was (COA) followed by (PDA and YEA), whereas the suitable temperature and incubation period for toxin production was 35?c and 7 days.
Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreHouse 21 fungal isolates fungus to the analyst Albroca output of manufactured blood clot from the Blama human blood showed positive fungi to test analyzes blood clot variation in times where decomposition recorded fungi
Serine Palmitoyltransferase SPT is the key enzyme in the de novo sphingolipids biosynthesis pathway in eukaryotes, including the intracellular parasite Leishmania. Previous studies showed that this enzyme SPT is expressed only in divided promastigote forms and it is non-essential in the amastigotes form of Leishmania major, which is known as the old world leishmaniasis. In this study we have studied the viability of new world lesihamniasis, Leishmania mexicana. Cytotoxicity test used to determine the effect of the SPT inhibitor myriocin which did not significantly affect the viability of the two forms of the in vitro cultures of the parasite p<0.05, procyclic promastigotes and amastigotes, in which cell viability for miltefosine trea
... Show MoreIn this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement. The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.
Abstract
Social media has thrived recently and public organizations at Thi-Qar governorate across different levels are experimenting with launching government social media (GSM) to facilitating two-way interactions between the government and its citizens. Both scholars and practitioners are focusing on understanding the key success factors related to the create of GSM. This study aimed to identify the key success factors by exploring the formation mechanism of individuals’ continuous usage intention. Through the theoretical perspective of the uses and gratifications theory. We identify the gratification factors that stimulate users’ continuance intention toward GSM. Furthermore, we draw upon the stimulus–organism–
... Show MorePostcolonial theory deals with the effects of colonization on the colonized societies and their cultures. It examines the complex relationship between the colonized and the colonizer, and it represents the textual reactions that deal directly with such an issue. It is also a literary critique to texts that carry racist or colonial implications. The emergence of postcolonial theory as an aspect of literary criticism represents a shift in the focus of studies regarding the relation between the western and non-western worlds.
In contemporary theoretical discourse, Edward Said has been among the more influential postcolonial critics to draw attention to the centrality of imperialism in Western culture. Said’s work has provided a th
... Show MoreThe optimum conditions for the production of neutral protease from local strain Aspergillus niger var carbonarius by solid – state fermentation system (Wheat bran) moisted with 0.2 M phosphate buffer (PH7.0) . the hydration ratio was 1:5 (V:W) . the concentration of inoculum was 1×106 spores per 10 gram of solid materials , initial P H 6.5 and 96 hours of incubation period at 30? C .the enzyme activity was 1300 unit / ml and specific activity was 1550 unit / mg protein .
In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More