The inhibitory effect of acetone, ethanol, and aqueous extracts of ten medicinal plants on β-lactamase from Staphylococcus sciuri and Klebsiella pneumoniae was investigated in vitro by starch-iodine agar plate method. The results revealed the success of starch-iodine method for the detection of the inhibition of β-lactamase activity by the various extracts of each individual plant. The acetone extracts of Catharanthus roseus, Eucalyptus camaldulensis, and Schinus terebinthifolius induced an inhibitory effect on β-lactamase from Staphylococcus sciuri. On the other hand, acetone extracts from only Eucalyptus camaldulensis, and Schinus terebinthifolius expressed strong inhibitory effect on β-lactamase from Klebsiella pneumoniae. The acetone extracts expressed the highest inhibition for β-lactamases activity compared to ethanolic and aqueous extracts which exhibited appreciable inhibitory effect. β-lactamase from S. sciuri was inhibited by extracts from C. roseus, E. camaldulensis and S. terebinthifolius whereas β-lactamase from K. pneumoniae was inhibited only by extracts from E. camaldulensis and S. terebinthifolius.
abstract
The grammatical tools (the letters of meanings) are of great importance in understanding the meanings of the Arabic sentences,
This research is a simple attempt to show how our venerable scholars employed the meanings of these tools when they interpreted the linguistic evidence, that is, the grammatical structure largely depends on the tool in forming the meaning within the sentences and employing the meanings of these grammatical tools in explaining the linguistic evidence by clarifying their significance in the contexts of their use and effectiveness. Synthesis of the meanings of grammatical tools is an important tool in understanding the linguistic structure in order to reveal its meaning.
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
This study deals with air pollution tolerance index (APTI) and anatomical variation in leaves of two species of terrestrial plants Ficus sp. and Conocarpus sp. that have bee commonly the separated along roadsides in many stations within Babylon province. APTI values of both species were less than 10 during study period which represented sensitivity of these plants to air pollution. There are Anatomical responses to pollution in the leaves of both studied species. Main adaptations included increased thickness of parenchyma cell walls with clear dark deposits in sections of Ficus sp. from sections of stations 2 and 4 which represent polluted stations. Conocarpus sp. main adaptation included stomata increased in density and decreased in size w
... Show MoreThe experiment was conducted to study the effect of leaves extract of Salvia sclarea , Rosmarinus officinalis and Thymus vulgaris with 10% and 30% concentration on germination of seeds and growth of seedlings . The effect of these extracts on infection percentage of seeds decay and surface growth of Rhizoctonia solani . The results showed that the three extracts effected significantly to reduced percentage of seeds germination, acceleration of germination , promoter indicator , infection percentage of seeds decay and surface growth of R. solani especially in 30% concentration .
In this work four complexes of antimony were prepared ,Na[SbO(gly)2],Na[SbO(Asp)2],Na[SbO(Tyrosin)2], Na [SbO(phen alanin)2]. by reaction SbOCl with salts amino acids identifiefid these complexes by FTIR ,their conductivity was measured and also their biological activity against two types of bacteria was studied ,they were biologically active.
Four new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,
... Show MoreABSTRACT
The study evaluated the effect of adding quercetin to some characteristics of the sperm of the ram. This study was conducted in the animal field, Department of Animal Production, College of Agricultural Engineering Science, University of Baghdad for the period 5/12/2021 to 20/2/2022. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-55 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: quercetin-free control group, treatment T1 (3 µL/mL quercetin), T2 treatment (6 µL/mL quercetin), T3 treatment (9 µL/mL quercetin). The result of the study showed
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More