In this study, gold nanoparticles were synthesized in a single step biosynthetic method using aqueous leaves extract of thymus vulgaris L. It acts as a reducing and capping agent. The characterizations of nanoparticles were carried out using UV-Visible spectra, X-ray diffraction (XRD) and FTIR. The surface plasmon resonance of the as-prepared gold nanoparticles (GNPs) showed the surface plasmon resonance centered at 550[Formula: see text]nm. The XRD pattern showed that the strong four intense peaks indicated the crystalline nature and the face centered cubic structure of the gold nanoparticles. The average crystallite size of the AuNPs was 14.93[Formula: see text]nm. Field emission scanning electron microscope (FESEM) was used to study the morphology of the AuNPs. AuNPs exhibited a spherical shape with diameters ranging 13–53[Formula: see text]nm. The synthesized stable gold nanoparticles showed more significant anticancer activity against MCF-7 and CAL-51 cells after 48[Formula: see text]h.
Background: Decontamination of gutta percha cones was important factor for success of root canal treatment. The aim of the present in vitro study was to identify and to compare the antimicrobial effect of following disinfection solutions: 0.2% chlorhexidine gluconate, Iodine, tetracycline hydrochloride solution, EDTA & formocresol mixed with zinc oxide eugenol, on E faecalis, E coli and Candida albicans using sensitivity test Materials and Methods: Three types of microorganisms were isolated from infected root canals (E faecalis, E coli and Candida albicans) and cultured on Mueller Hinton agar petri-dishes. Disinfection of gutta percha cones done by immersion in six disinfection solutions (six groups), the groups are: distill water (used a
... Show MoreThe inhibitive effect of imidazol on the dissolution of Zn in (1M) HCl has been studied. The inhibion effect of imidazol ,protection efficiency and the corrosion rate of Zn in (1M) HCl were investigated at various concentrations (1x 10-3 – 5x10-3) M and tempearture range (285-328) K. The corrosion inhibitive of Zn by imidazol was studied using weight loss measurement and analytical titration of the amounts of dissolved zinc in acidic solution in presence and absent of imidazol. It was observed that imidazol led to protection efficiency reached to (88.93)% when (10)mM imidazol concentration was used. A linear relationship came true between (C/?) and (C); where (?) is the coverage of Zn surface by imidazol which could be obtained from
... Show MoreThe proposed method is sensitive, simple , fast for the determination of mebeverine hydrochloride in pure form or in pharmaceutical dosage . Using Homemade instrument fluorimeter continuous flow injection analyser with solid state laser (405 nm) as a source. Where it is based upon the fluorescence of fluorescein sodium salt and quenching effect of fluorescence by mebeverine in aqueous medium. The calibration graph was linear in the concentration range 0.05 to10 mMol.L-1 (r= 0.9629) with relative standard deviation (RSD%) for 1 mMol.L-1mebeverine solution was lower than 3% (n=6). Three pharmaceutical drugs were used as an application for the determination of mebeverine. A comparison was made between the newly developed method of analysis wit
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreA method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe research's purpose is to highlight the role that the Approach of the strategic decision play in universities' governorships, assuming that the universities' governorship are definite result that can be reached by modern universities through their active strategic decisions that they take based on the correct way of thinking and the appropriate entrance that achieve the strategic goal of these decisions. The current research depended on two curriculums necessitated by the research requirement which are the analytical description curriculum and compare curriculum, the field research was done in the (Baghdad and Al-Mustansiriya) universities, the samples that were selected were the president, assistants and members of the board'
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More