The real and imaginary part of complex dielectric constant for InAs(001) by adsorption of oxsagen atoms has been calculated, using numerical analysis method (non-linear least square fitting). As a result a mathematical model built-up and the final result show a fairly good agreement with other genuine published works.
Pseudomonas aeruginosa is considered as a developing opportunistic nosocomial pathogen and is well-known for its multidrug resistance that can be efficiently treated by a combination of antibiotics andefflux pump inhibitors (EPI). Therefore, the purpose of this study was to investigate the effect of curcumin as an EPI for the enhancement of the effectiveness of antibiotics against multidrug resistant (MDR) isolates ofP. aeruginosa. Susceptibility patterns of suspected bacteria was determined using the disc diffusion method andresistant bacteria were identified using chromogenic agar and 16S rDNA. The effectsof curcuminon the enhancement of antibiotics’s activity was evaluated usingthe broth microd
... Show MoreIn this paper, we proposed a hybrid control methodology using improved artificial potential field with modify cat swarm algorithm to path planning of decoupled multi-mobile robot in dynamic environment. The proposed method consists of two phase: in the first phase, Artificial Potential Field method (APF) is used to generate path for each one of robots and avoided static obstacles in environment, and improved this method to solve the local minimum problem by using A* algorithm with B-Spline curve while in the second phase, modify Cat Swarm Algorithm (CSA) is used to control collision that occurs among robots or between robot with movable obstacles by using two behaviour modes: seek mode and track mode. Experimental results show that the p
... Show MoreIn this article, an efficient reliable method, which is the residual power series method (RPSM), is used in order to investigate the approximate solutions of conformable time fractional nonlinear evolution equations with conformable derivatives under initial conditions. In particular, two types of equations are considered, which are time coupled diffusion-reaction equations (CD-REs) and MKdv equations coupled with conformable fractional time derivative of order α. The attitude of RPSM and the influence of different values of α are shown graphically.
This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreFungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in a
... Show MoreCarbon nanotubes were prepared by an arc-discharge method,
under different values of pressure of oxygen gas. The structure of
multi-walled carbon nanotubes powders has been characterized by
low-angle X-ray diffraction .The morphology of carbon nanotube
powder was examined by transmission electron microscope. The
capacitance-voltage and current- voltage (dark and illumination
current) characterization were measured under different values of
pressure (10-3, 10-4, 10-5) mbar of oxygen gas