Four local hemolysin producer bacterial isolates were selected, tow of them gram negative bacteria (Escherichia coli ,Pseudomonas aeruginosa ) and the other two were gram positive bacteria (Staphylococcus aureus , Bacillus cereus ). Minimum inhibitory concentration of the aqueous and alcoholic extracts of Punica granatum L. pericarp were determined towards the four bacterial isolates ,results obtaind showed that MICs of the aqueous extract were 200 mg/ml for E .coli and P. aeruginosa isolates while were 5 mg/ml and 2 mg/ml for B. cereus, S. aureus , respectively The MICs for the ethanolic extract were 50 mg/ml , 20 mg/ml ,1 mg/ml ,0.5 mg/ml for E. coli ,P. aeruginosa ,B. cereus ,S. aureus , respectively. The effect of Sub-MICs of the aqueous and alcoholic extracts on hemolysin production was investigated , both extracts had a suppressing effect on hemolysin production by E. coli ,P. aeruginosa ,while both extract had an inhibitory effect on hemolysin production by S. aureus and B . cereus isolates
The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreThe Importance of Effort and its Impact in Building the Society in the Light of
the Holy Book and Sunna.
Thank for God and peace be upon Prophet Muhammad, His hose hold and
Companions.
This research is to refute a fault : that Islam as a religioncalls for laziness and
dependence and this in first, Second, to show the originality of the Islamic method in
building and construction.
This research Starts with an introduction in which I refer to the nature of the
Islamic method and its way of work in life: that it is a divine method that is achieved
by the effort of the people them selfves and not through a divine extraordinary power:
The research explains the shift in the peoples life who were addressed by this<
This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona
... Show MoreThe purpose of this study is to compare the influence of three teaching methods, as represented by problem-based learning (PBL), the PBL with lecture method, and the conventional teaching on undergraduate physics students' group work skills among bachelor’s degree physics students. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The actual sample size comprises of 122 students, who were selected randomly from the physics department, college of education in iraq. Overall, the statistical results rejected null hypothesis of this study. Thus, using the PBL without or with lecture method enhances the skills of the group work among the bachelor’s degree physics studen
... Show MoreThree types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre
... Show MoreThe present study was designed to shed light on the molecular effects caused by acute myeloid leukemia (AML). It was also aimed to investigate ASXL1 point mutations in newly AML patients as compared to healthy control. The study comprised of 43 AML Iraqi patients and their ages ranged between 16-75 years. It included 23 females and 20 males compared with 20 healthy controls. Results revealed that the extracted DNA from 30 AML patients and amplified by PCR to obtain ASXL1 gene from exon 12 showed larger bands (479). Among forty three patients, two of them displayed point mutations of deletion and substitution, while the others were normal since no mutations were detected. The total of mutations in two mutated patients was 27 mutations, the m
... Show More