the study including isolation and identification of candida spp causing UTIs from patintes coming to al-yarmouk hospital
total of 17 Escherichia coli isolates were collected from urine specimens of patients with urinary tract infection. Antibiotics sensitivity test indicated that amikacin followed by chloramphenicol and ciprofloxacin are the most effective antibiotics. The isolates showed multidruge resistant, nine isolates were resistant to 11-15 antibiotics, 3 were resistant to 16-20 antibiotics and 5 were resistant to 21-25 antibiotic. Two isolates were selected, the first (ED1) was resistant to (22) antibiotics while the second isolate (ED2) was resistant to (14) antibiotics (out of 25). Minimum inhibitory concentration (MIC) of the black and green tea water boiled extracts were determined towards (ED1,ED2).Results showed that MIC of black tea extr
... Show MoreNefopam (N.F.) HCl is a non-narcotic centrally-acting, non-opioid benzoxazocine analgesic to relieve acute and chronic pain. It exhibits low bioavailability (about 36%) due to its first-pass degradation in the liver.
Intranasal administration has been used as a new route for targeting active brain sites and enhancing the bioavailability of N.F. HCl bypassing hepatic metabolism.
In situ gel of N.F. HCl was prepared by the cold method using different concentrations of Poloxamer 407, Poloxamer 188, HPMC K4M, Carbapol 934, and Hyaluronic acid polymers.
The results show that identification tests are superimposed with references, solubility study shows that N.F. HCl is suitable to be administered intranasally; Compatibi
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreThe objective was to study the effect of prepared ginkgo biloba extracts against Candida albicans isolated from healthy persons. Conducting susceptibility test, biofilm formation test, phytochemical screening test, and antioxidant activity test. One hundred oral swabs sample were obtained from healthy persons with oral lesion attending dentistry teaching hospital in dentistry college, their age ranged from 1-30 years of both sexex. The studied samples collected through 8 months (April - December / 2018). This study included two different types of ginkgo bilola extracts were prepared as aqueous and ethanolic extracts. Many tests were used, which included isolation and identification of C.albicans, conduct susceptibility test, biofilm form
... Show More