The present study was carried to evaluate antibacterial activity of Acetone, Alcholic (cold and hot) and Aqueaus(water) extracts of Citrus aurantifoliaseeds,against growth of some bacteria isolated from burns infections(Pseudomonas aeruginosa,Escherichia coli, Klebsiellapneumonia,Staphylococcusaureus)fromKindy HospitalIn Baghdad from March to June 2012.Antibiotic Sensitivity was done for all isolated bacteria used in this study.Results showed variation in antibacterial activity of different extracts against all tested bacteria by well diffusion technique in agar and measuring the diameter of inhibition zone, at concentration 250Mg-ml. Acetone extract had the greatest inhibitory effect followed by hot alcoholci extract, and then cold alcoholic extract,while the aqueous extract slightly inhibited bacteria. Minimum inhibitory concentration(MIC)were determined for all extracts against studying bacteria and found(12.5-50)mg-ml for acetone and alcoholic extracts, MIC for aqueous extract was 50mg-ml forPseudomonasaeruginosa and Escherichia coli,while was no effect onKlebsiellapneumonia and Staphylococcusaureus. Minimum Bacterial Concentration(MBC)were determined and was found25-50mg-ml for acetone extract,hot water was25mg-ml, cold alcoholic extract was 50mg-ml forPseudomonasaeruginosa,Escherichia coli andKlebsiella pneumonia but showed no effect on Staphylococcus aureus, aqueous extract showed negative effect on alltested bacteria. The antimicrobial activity of hot alcoholic extract of seeds was investigated practically (in vivo) by treating burns mices infected with tested bacteria(Pseudomonas aeruginosa,Escherichia coli and Klebsiellapneumonia),the results revealed good recovery at short time comparing with antibiotic(Flamazine) used at the same time.
The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreChristianity rejected abortion, since its inception, it took a luck against abortion, although there is no mention of it in the Bible, as there is no explicit text for abortion in the Old or New Testament and that the early Christians considered abortion a sin in all stages, and beliefs included abortion as an act of murder. What is forbidden in the Ten Commandments is “Thou shalt not kill”, and it is understood that killing here is either plundering one’s personal life (suicide) or stealing another person’s life (killing), or stealing the life of a person who has not yet been born (aborting fetuses). Based on the above, it was necessary for individuals to search for (Abortion in the Christian Religion / Descriptive Study) The resea
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreBackground: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreThe rapid increase in the number of older people with Alzheimer’s disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems because of a large number of people affected. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available, and to plan for the future. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage caused to the brain due to AD leads t
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show More