This study has been done on plant [Adhatoda vasicia , Acanthaceae family],which has been collected from gardens of university of Baghdad The leaves of plant were extracted by methanol alcohol obtain the crude extraction good ratio(30%).Eighty swabs or samples were collected from several wounds patients of hospitals in Baghdad city.These swabs were cultured on blood and MacConkey ager to isolate bacteria and identified by appearance and bio chemical tests.The results showed that(60)somples were positive(75%)for tests bacteria white the other(20)swabs were negative(25%).The bacteria were identified as Pseudomonas aeruginosa ,Staphylococcus awreus , Esherichia coli,Proteus spp and Klebsiella spp; and their number percentage were(32)isolates(49.2 %),(7)isolates(10.7%),(5)isolates(7.6%),(1)isolate(1.5%)and(20)isolates(30.7%)respectivity.Crude extract teated by sensitivity test against the bacteria with concentration (2,4,6,8,10,12mg/ml).The results showed that the inhibition zone increased with increasing ils concentration The best concentration that inhited most of the bacteria is(6 mg/ml) of the crud extract that was isolated from wounds .
In this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition t
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreOil price forecasting has captured the attention of both researchers and academics because of the unique characteristics of crude oil prices and how they have a big impact on a lot of different parts of the economic value of the product. As a result, most academics use a lot of different ways to predict the future. On the other hand, researchers have a hard time because crude oil prices are very unpredictable and can be affected by many different things. This study uses support vector regression (SVR) with technical indicators as a feature to improve the prediction of the monthly West Texas Intermediate (WTI) price of crude oil. The root mean square error (RMSE), mean absolute error (MAE), and mean absolute percentage error (MAPE) measur
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreDiamond-like carbon, amorphous hydrogenated films forms of carbon, were pretreated from cyclohexane (C6H12) liquid using plasma jet which operates with alternating voltage 7.5kv and frequency 28kHz. The plasma Separates molecules of cyclohexane and Transform it into carbon nanoparticles. The effect of argon flow rate (0.5, 1 and 1.5 L/min) on the optical and chemical bonding properties of the films were investigated. These films were characterized by UV-Visible spectrophotometer, X-ray diffractometer (XRD) Raman spectroscopy and scanning electron microscopy (SEM). The main absorption appears around 296, 299 and 309nm at the three flow rate of argon gas. The value of the optical energy gap is 3.37, 3.55 and 3.68 eV at a different flow rate o
... Show MoreThis paper investigates the capacitated vehicle routing problem (CVRP) as it is one of the numerous issues that have no impeccable solutions yet. Numerous scientists in the recent couple of decades have set up various explores and utilized numerous strategies with various methods to deal with it. However, for all researches, finding the least cost is exceptionally complicated. In any case, they have figured out how to think of rough solutions that vary in efficiencies relying upon the search space. Furthermore, tabu search (TS) is utilized to resolve this issue as it is fit for solving numerous complicated issues. The algorithm has been adjusted to resolve the exploration issue, where its methodology is not quite the same as the normal a
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show More