The study in duded isolation and identification of microbial isolates from oral cavity to 10 volunteers, diagnosed within the three groups: Staphylococcus aureus, Staphylococcus epidermidis, Streptococcus spp. and Candida albicans . The sensitivity test of all isolates bacteria Streptococcus spp. , S. aureus and S. epidermidis showed high resistance to Ampicillin(100)%,followed Methicillin (88.88)% and Amoxicillin / clavulanic acid(77.77)%, while the resistance for each of Vancomycin and Amoxicillin were (66.66)%, and the resistance to Erythromycin and Pencillin (55.55)% to each of them. The results showed less resistance to Trimethoprim (22.22)% and Cefalotine (11.11)% of all bacteria isolate. Investigation of the presence of active compounds in each of the hot and cold (water and alcoholic) extracts flowers Rose and flowers blossom bitter orange ( new preparatory 2012) (Alkaloids, Quartet alkaloids, sugars, Saponine, Flavones and comarins ) was carried out includes. While it was all kinds of extracts does not contain resins. The results showed the presence of active compounds (Sugars, Flavones and comarins) in old extracts that preparation after a year (2011). PH values of the plant extracts hot and cold (water and alcoholic) for each of orange flowers blossom and Rose flowers (Old and new preparatory) with a wide range ranging between (3.6 -6.4). All extracts hot and cold (alcoholic) (new preparatory 2012) showed most effective towards Streptococcus spp., S. epidermidis and Candida albicans, while the extracts show weak effective against S. aureus. Hot alcohol extracts of Rose (old preparatory 2011) showed most effective towards S. aureus and S. epidermidis only, while the other extracts of old perpetration show weak effective against Streptococcus spp. and C. albicans.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show More
Background: Infections are common in the children attending daycare centers how act as predisposes to it. Hygienic interventions have a fundamental role in infection control and disease prevention in child care settings.
Objective: - To evaluate the knowledge, attitude, and practice of nurseries workers in infection prevention and control among the children.
Subjects and Methods: A cross-sectional study using the researcher-developed questionnaire validated by two experts and piloted and 100 nurseries-workers had participated in it.
Result: the mean age of participants was 37.5 years±12.1, (37%) aged 18-30 yrs, 58% married, and 57% with higher education, 54% of n
... Show MoreThe studied succession is deposited during late Berriasian-Aptian interval, which is represented by the Zubair, Ratawi, Yamama formations. The present study includes stratigraphic development and basin analysis for 21 boreholes (Rachi-1, 2; Rifaei-1, Diwan- 1; Ratawi-1, 2; Halfaia-5; West Qurna 12, 15; Nahr Umr-7,8; Zubair-47,49; North Rumaila- 72, 131, 158; Suba-7; Majnoon-2, 3 and Luhais-2, 12) distributed within 13 oil fields in the southern Iraq. The back-stripping process determined the original direction of basin depocenter for the studied succession. The Yamama basin in the study area stretches from southeast to southwest with single depocenters, it was located in the southeast of the study area near wells Mj-2, Mj-3.NR-8 and
... Show MoreSimple, cheap, sensitive, and accurate kinetic- spectrophotometric method has been developed for the determination of naringenin in pure and supplements formulations. The method is based on the formation of Prussian blue. The product dye exhibits a maximum absorbance at 707 nm. The calibration graph of naringenin was linear over the range 0.3 to 10 µg ml-1 for the fixed time method (at 15 min) with a correlation coefficient (r) and percentage linearity (r2%) were of 0.9995 and 99.90 %, respectively, while the limit of detection LOD was 0.041 µg ml-1. The method was successfully applied for the determination of naringenin in supplements with satisfac
... Show MoreThin film solar cells are preferable to the researchers and in applications due to the minimum material usage and to the rising of their efficiencies. In particular, thin film solar cells, which are designed based one transition metal chalcogenide materials, paly an essential role in solar energy conversion market. In this paper, transition metals with chalcogenide Nickel selenide termed as (NiSe2/Si) are synthesized. To this end, polycrystalline NiSe2 thin films are deposited through the use of vacuum evaporation technique under vacuum of 2.1x10-5 mbar, which are supplied to different annealing temperatures. The results show that under an annealed temperature of 525 K,
... Show MoreAbstract
The research aims to identify the extent of the practice of social responsibility in accordance with the social dimension and diagnosis of constraints applied.
Find the problem represented by the Social Responsibility and obstacles facing application in Baghdad Municipality through their workers trends analysis.
The adoption of the statistical method to analyze the data and information gathering, and selected municipalities of Adhamiya and Kadhimiya deliberate manner applied as a state and municipal councils of both cities as representatives of the local community to be the subject of research and comparison between them to see the reality of soci
... Show MoreFingerprint recognition is one among oldest procedures of identification. An important step in automatic fingerprint matching is to mechanically and dependably extract features. The quality of the input fingerprint image has a major impact on the performance of a feature extraction algorithm. The target of this paper is to present a fingerprint recognition technique that utilizes local features for fingerprint representation and matching. The adopted local features have determined: (i) the energy of Haar wavelet subbands, (ii) the normalized of Haar wavelet subbands. Experiments have been made on three completely different sets of features which are used when partitioning the fingerprint into overlapped blocks. Experiments are conducted on
... Show More