in recent years cryptography has played a big role especially in computer science for information security block cipher and public
Laboratory experiments were carried out in Technical college AL- Mussiab / Babylon during 2005 to study bioactivity of different concentration from ( aqueous , alcohol and hexane) extracts of bee venom collected from different workers of bees against some bacterial types that cause European Foul – brood Melissococcus plutom , Bacillus alvei and B. letrosporus which had been isolated from infected arched with disease . Two diffusion methods (digging and paper discs) were followed for the extraction of the venom . Results showed that digging diffusion method was more efficient for test of bacterial inhibition which led to increase the activity of bee venom extract with general a
... Show MoreCadmium sulfide photodetector was fabricated. The CdS nano
powder has been prepared by a chemical method and deposited as a
thin film on both silicon and porous p- type silicon substrates by spin
coating technique. Structural, morphological, optical and electrical
properties of the prepared CdS nano powder are studied. The X-ray
analysis shows that the obtained powder is CdS with predominantly
hexagonal phase. The Hall measurements show that the nano powder
is n-type with carrier concentration of about (-5.4×1010) cm-3. The
response time of fabricated detector was measured by illuminating
the sample with visible radiation and its value was 5.25 msec. The
specific detectivity of the fabricated det
The adsorption isotherms and kinetic uptakes of CO2 were measured. Adsorption isotherms were measured at two temperatures 309 K and 333 K and over a pressure range of 1 to 7 bar. Experimental data of CO2 adsorption isotherms were modeled using Langmuir, Freundlich and Temkin. Based on coefficient of correlation it was found that Langmuir isotherm model was well suited with the experimental data of CO2 adsorption isotherms. In addition, Adsorption kinetic of CO2 mixture with N2 containing 10 % by volume CO2 and 90 % by volume N2 were determined in a temperature 36 °C and under the atmospheric pressure .When the flow rate was increased from
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreEducational of the mind is a weapon to a different knowledges which
benefit in ife and developed the mind in many field and practice him in a
regular form in a right thinking and practice sense on exactly recognizing and
conception things which is senses and regulating the memory and providing
with benefit information which fit to minded of person,the present research
aimed at answering the following two questions:
1-Does the concept of mind differ with age?
2-Does the recognition on function of mind developed with development of
age?
The research population consisted of the children in the primary schools
of Baghdad/center,and the students of the Education for woman
college/Baghdad university for the age
The present study is undertaken to evaluate the effects of hypothyroidism induced by carbimazol in male rat reproductive system. Rats were treated with carbimazol (80 and 160 mg/kg body weight) daily for two, four, six, and eight weeks, while control rats were given distilled water orally. The results of these experiments are: 1-Treatment with carbimazol produced increase in body weight of treated animals. This increase was not statistically significant even at high concentrations. 2-Decrease in testicular weight was observed during all administration points. This decrease was aggravated proportional to duration and dose (p≤0.001). 3-Results of most intervals showed significant decrease in epididymal-head weight, while no sig
... Show MoreBromelain is a proteolytic enzyme rich in cysteine proteases, extracted from the stem and fruit of pineapple (Ananas comosus). There are several therapeutic applications of the bromelain enzyme, where it has anti-inflammatory, anti-cancer, and antimicrobial activity, reduces joint pain, and accelerates wound healing. In the current study, bromelain enzyme was loaded on silver nanoparticles (Br-AgNPs) prepared using the citrate-reduction Turkevich method. Different characterization analyses were performed, including UV-Vis spectrophotometers, FTIR, SEM, and XRD analyses. Moreover, the antioxidant activity of prepared Br-AgNPs was evaluated by DPPH assay. The results of UV-Vis showed a peak at 434 nm, which referred to the AgNPs f
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThis study focused on determining the effect of the alcoholic extract of curcuma longa on mouse embryo, twenty adult white Swiss mice used in this study. Experimental animals were divided into four groups with six mice for each group. For mating occur, 3 females and male were placed in cage. It was confirmed that the mating took place when examining the next morning and watching the vaginal plug, and considered that the day after mating is the first day of the pregnancy. We prepared three subs lethal concentrations of curcuma longa were applied to Experimental groups except control group, 10 mg/kg, 50 mg kg/ and 100 mg/kg. From 7-14 of pregnancy we were given the pregnant mice 0.1 ml per 10 gm body weight.
... Show More