This Study aimed to studying the effect of Volatile oil extracted from the leaves of Myrtus communis on the growth and activities of the following types of bacteria: Staphylococcus aureus, Streptococcus pyogenes, Klebsilla pneumoniae, Pseudomonas aeruginosa, and the yeast Candida albicans. The results showed an inhibitory effect of the oil on both the growth and activity of the tested microbes. This was reflected by the minimum inhibitory concentration (MIC) of Staphylococcus aureus, Streptococcus pyogenes, Klebsilla pneumoniae, Pseudomonas aeruginosa which was: (2.5, 1.25, and 2.5,5 % respectively), and the yeast (5) %. Also, the Minimum bactericidal concentration (MBC) to the bacteria mentioned above was (5, 2.5,5,10 % respectively) while the yeast was (10) %.
Breast cancer (BC) is one of the most frequently observed malignancy in females worldwide. Today, tamoxifen (TAM) is considered as the highly effective therapy for treatment of breast tumors. Oxidative stress has implicated strongly in the pathophysiology of malignancies. This study aimed to investigate the changes in the levels of oxidants and antioxidants in patients with newly diagnosed and TAM-treated BC. Sixty newly diagnosed and 60 TAM-treated women with BC and 50 healthy volunteers were included in this study. Parameters including total oxidant capacity (TOC), total antioxidant capacity (TAC), and catalase (CAT) activity were determined before and after treatment with TAM. The serum levels of TOC and oxidative stress index (OSI) were
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreAfter baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph
... Show MoreThis research aims to study the influence of organizational power on the achievement of entrepreneurship for business organizations. It is an analytical study of the views of a sample of managers in the Iraqi Ministry of Education. The research highlights the contribution that can be made from the knowledge of the theory of business organizations in achieving organizational success. The organizational power of the organization contributes to achieving entrepreneurship in the business environment and achieving a competitive position in the work environment. The research dealt with two variables: the first is the independent variable, the organizational power in its dimensions (Expend Power, Structural Power, Prestige Power). And t
... Show MoreObjective(s): This study aims at determining the effectiveness of an educational program on knowledge of high school students' knowledge about substance abuse and its health consequences, and to find out the association between students’ knowledge about substance abuse and its health consequences and their demographic data of age, socioeconomic status, and educational level of parents.
Methodology: A quasi-experimental study is conducted for the period of October 28th, 2019 to March 30th, 2020. The study sample included a nonprobability “purposive” sample of (124) male students (62) students for the control group and (62) students for the study group, aged (14-19) years who are selected from Al-Hikma High School for Boys in Kirk
Ration power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems
... Show MoreAbstract
The current research aims at identifying any of the dimensions of organizational learning abilities that are more influential in the knowledge capital of the university and the extent to which they can be applied effectively at Wasit University. The current research dealt with organizational learning abilities as an explanatory variable in four dimensions (Experimentation and openness, sharing and transfer of knowledge, dialogue, interaction with the external environment ), and knowledge capital as a transient variable, with four dimensions (human capital, structural capital, client capital, operational capital). The problem of research is the following questio
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More