G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
The research aims at benefiting from the technological development and the technical progress. This development necessitated that the educational process take advantage of this progress, and the development of special computer software, especially the design programs, made the two researchers think about how to benefit from these design programs in teaching students the skills of theatrical design.
The current search aims at:
Identifying the effect of 3Ds Max in developing the skill of theatrical decoration design among the students of the Department of Art Education "Third stage / Department of Art Education / Faculty of Fine Arts / University of Diyala for the academic year 2014-2015.
The researchers used the ex
... Show MoreThe technology and modern social communication medias have contributed to changing many of our concepts about education to a large extent; these technological advancements have created new challenges for the Instructor of course, but on the other hand it did provided him with expressive media, models and strategies that the old methods cannot fulfill, including the flipped classroom strategy, which is one of the modern technical solutions and in it's optimal use it can correct the weakness of the traditional education and can develop the communication skills as a whole among the students, in order to create a positive, active and interactive student.
The current research contained - four chapters: the first one included the methodolog
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreBackground: L. sativum, are traditionally used for the treatment of various diseases and thought to have medicinal value. Isolates from many part of the world is now multidrug resistant. Therefore, there is an urgent need to look for and test an alternative herbal drug.
Objective: The present study aimed to evaluate the antibacterial activity of L. Sativum seed extract against multi drug resistant (MDR) and sensitive Pseudomonas aeruginosa clinical isolates.
Subjects and Methods: An ethanolic and aqueous stock extracts were prepared from L. sativum seed plant then serial dilutions were prepared and the obtained concentrations (50, 25, 12.5 and 6.2 mg/ml) were tested against 30 multidrug-resistan
... Show More