The antibacterial effect of (Eruca sativa) extract was evaluated by an in vitro study testing the growth of various Gram-Positive and Gram-Negative bacteria . The bactericidal activity of this extract was analyzed by serial dilution in tubes. This study,found that Gram-Negative and Gram-Positive bacteria susceptible to very low eruca concentrations. On the other hand, Gram-positive bacteria were more susceptible than Gram-negative bacteria, the minimal bactericidal concentration of Gram-positive bacteria was 5 mg ml-1 but minimal bactericidal concentration of Gram-negative bacteria was 10 mg ml-1 that mean duble inhibation concentration of Gram-positive bacteria . this study suggest that Eruca sativa leaves have inhibation effect on Gram-Posative and Gram-Negative bacteria and Eruca sativa was natural material with little side effect.
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreTo assess cultural competence among nursing students from nine countries to provide an international perspective on cultural competence.
A descriptive, cross‐sectional design.
A convenience sample of 2,163 nursing students from nine countries was surveyed using the Cultural Capacity Scale from April to November 2016.
The study found a moderate range of cultural competence among the students. The ability to teach and guide other nursing colleagues to displ
tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreSoils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreImage databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p