Preferred Language
Articles
/
ijs-10375
In Vivo Effect of Catharanthus roseus Crude Extracts on Pathogenic Bacteria Isolated from Skin infections

This study includes collection of 70 swabs samples of burns from patients were
admitted in three hospitals (Baghdad, Al- Numaan and burns injuries Hospital). All
swabs samples were cultured on blood and MacConkey agar media to isolate and
identify pathogenic bacteria according to their morphological , biochemical and
growth characters. Growth of bacteria on selective media showed the following
results: Pseudomonas aeroginosa 44.28% , Klebsiella pneumonia 30% ,
Staphylococcu saureus 8.57% , Escherichia coli 4.28% , Proteus vulgaris 4.28 % ,
Enterobacter spp. 5.71% , Acinetobacter baumanni 2.89 %. Different concentrations
were prepared from leaves ethanolic crude extract of Catharanthus roseus , then the
anti-bacterial activity of this extract was evaluated in vivo. Burns were achieved
experimentally in Albino mice and contaminated with pathogenic bacteria and
evaluate the ability of extract in healing of these infected burns. Results showed that
the extract accelerate burns healing within 7days.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2007
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Significance of Serum Pepsinogens in Atrophic Gastritis

Background: Chronic atrophic gastritis is a precancerous lesion. A commonly used test for the diagnosis of chronic atrophic gastritis, gastric endoscopy with biopsy collection, and a good
serological test would be best include low levels of pepsinogen I (PGI) or a low PGI/PGII ratio. 
Aim of the study: T o confirm the use of serum pepsinogens as a screening marker in atrophic gastritis.
Patients and Methods: A study was conducted in the period between December 2005 and March 2006 on 25 patients with atrophic gastritis attending Gastroenterology and Hepatology Teaching Hospital in Baghdad, and 25 healthy control subjects. Sera were tested for PGI and PGII by ELISA test.
Results and Conclusions: th

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Mon Jul 09 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION: ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION

This study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Applied System Innovation
Earthquake Hazard Mitigation for Uncertain Building Systems Based on Adaptive Synergetic Control

This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Sumer Journal For Pure Science
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Comparison between Radial Basis Function and Wavelet Basis Functions Neural Networks

      In this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented

View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
Scopus Crossref
View Publication Preview PDF