Preferred Language
Articles
/
bsj-764
Effect of Subinhibitory concentration of Antibiotic on Bacterial Adherence to Orthopedic Prosthetic Device

The effect of subinhibitory concentration of Antibiotics on the Adherence of S.aureus (Coagulase Positive Staphylococci), and S.epidermidis (Coagulase negative Staphylococci) and Pseudomonas aeruginosa, Enterobacter cloacae, Citobacter freundi (Gram negative bacteria) was done and the results revealed that Rifampicin was the best antibiotic inhibiting Staphylococci adherence and Vancomycin has less effect on the adherence of Staphylococci, whereas Tetracyclin was the best antibiotic inhbiting Gram negative bacteria adherence and Amikacin has the lest less effect on inhibiting bacterial adherence.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Impulsive Pressure Activity on MHD Flux Generalized Burgers Fluid
Abstract<p>The main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa</p> ... Show More
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Review on Vision Based Real Time Fingertip Detection Approaches

    Computer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

Crossref (1)
Crossref
View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Data Hiding in 3D Model Based on Surface Properties

    Data hiding strategies have recently gained popularity in different fields; Digital watermark technology was developed for hiding copyright information in the image visually or invisibly. Today, 3D model technology has the potential to alter the field because it allows for the production of sophisticated structures and forms that were previously impossible to achieve. In this paper, a new watermarking method for the 3D model is presented. The proposed method is based on the geometrical and topology properties of the 3D model surface to increase the security. The geometrical properties are based on computing the mean curvature for a surface and topology based on the number of edges around each vertex, the vertices

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Journal Of Electrical And Electronics Engineering
HF Wave Propagation Prediction Based On Passive Oblique Ionosonde

High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the

... Show More
Scopus
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON Weak g *sD -Sets And Associative Separation Axioms

   In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
 

View Publication Preview PDF