G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
This study has been performed to study the inhibitory effects of crude plant extracts of Bay (laurus nobilis) leaves against some bacterial isolates represented by Staphylococcus aureus, Staphylococcus epidermids, Proteus vulgaris, Bacillus subtilis, Escherichia coli, and Pseudomonas aeroginosa in vitro. The results showed that percentages of essential chemical of laurus nobilis leaves which represented by moisture, total oil, total ash, crude protein, crude fibers, carbohydrites and caloric values in dry weight are 5.96, 4.28, 14.2, 8.75, 24.8, 76.99%, and 284.92 kcal/100g respectively, the percentages of some major and minor mineral elements of laurus nobilis leaves powder which represented by Mg, Fe, Cu, Pb, Cd and As, are: 0.211, 0.1
... Show MoreThe research aims to find out the effect of Cognitive Acceleration strategy and random excitement strategy in achievement of geography material and developing the reflective thinking for students of literary fifth class .
the researcher depended a partial control experimental design with the three groups(the competence groups of the pre & post tests), The sample is deliberately selected from first AL-Rusafah Directorate General of Education in Baghdad. AL.fardoos Interme
... Show MoreRKASFH Ghanim, Ibn Al -Haitham Journal for pure and applied science, 2017
The study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det
The adsorption process of 5-Fluorouracil (5FU) drugs on Aluminum nitride nanotubes surface (AlNNTs) have been evaluated through density functional theory (DFT). The DFT results show that the interaction of AlNNTs with the F atoms of 5FU drugs is strong due to the fact that the amount of adsorption energy was about − 29.65 kcal.mol−1. Conversely, the interaction of the 5FU through O atoms with the AlNNTs was weaker due to the lower value of adsorption energy. Also, based on the values of Gibbs free energy, the 5FU adsorption on the surfaces of AlNNTs was spontaneous. In addition, based on natural bond orbital (NBO) analysis, the direction of charge transfer was from fluorine’s σ orbitals of the drug to nitrogen’s and aluminum’s n*
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreFive novel nickel, iron, cobalt, copper, and mercury complexes were synthesized from tetraazamacrocyclic Schiff base ligand (L), which were derived from 3-(4-(dimethyl amino) benzylidene) pentane-2,4-dione and 1,2- diaminocyclohexane in a 2:2 molar ratio. Many physico-chemical and spectroscopic techniques, including melting point, 1HNMR, 13CNMR, elemental analysis, molar conductance, magnetic susceptibility, UV-Vis, FT-IR, and thermogravimetric analysis (TGA), were used to characterize the Schiff base ligand and all metal complexes. The octahedral geometry of all the complexes [MLCl2] is confirmed by spectroscopic analyses. All substances' biological properties, such as their in vitro antioxidant activity or level of free radical scavenging
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More