The present study aims to evaluate the synergistic activity of nicotinic acid (NIC) with the Imipenem (IMI) as an anti-biofilm for clinical isolated Pseudomonas aeruginosa. The values of minimum inhibitor concentration (MICs) for IMI and NIC (Separately) against P. aeruginosa were (16) ug/mL and (8) ug/ml respectively. Whereas, the concentration of NIC with IMI (as combined) for biofilm inhibition was 1 ug/ml for NIC and 4 ug/ml for IMI. The combining of NIC with IMI showed synergistic efficacy against formation of bacterial biofilm (at MIC levels). These results provide a conclusion that NIC combined with IMI is can be considered as a successful prospective treatment against the biofilm produced by P. aeruginosa and as antibacterial medication.
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreBackground:Parkinson’disease(PD) is a neurodegenerative disorder of the central nervous system characterized by resting tremor, bradykinesia, cogwheel rigidity, and impairment of postural reflexes; the frequency of PD increases with aging.Clinically Parkinson's disease characterized by two groups of symptoms: motor and non-motor symptoms.Non-motor symptoms can be categorized as autonomic, cognitive/psychiatric (may include depression, dementia, anxiety, hallucinations), sensory and rapid eye movements (REM) sleep behavior disorder (RBD).
Objectives:The objectives of this study are to find out the frequency of the non-motor symptoms of idiopathic Parkinson disease in a group of patients in Baghd
... Show MoreThe aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.
The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.
Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.
The results of the research showed an inverse relation between being unemployed and having wellbeing.
&nb
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreCholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.
This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).
In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6
... Show MoreThe rehabilitation of deteriorated pavements using Asphalt Concrete (AC) overlays consistently confronts the reflection cracking challenge, where inherent cracks and joints from an existing pavement layer are mirrored in the new overlay. To address this issue, the current study evaluates the effectiveness of Engineered Cementitious Composite (ECC) and geotextile fabric as mitigation strategies. ECC, characterized by its tensile ductility, fracture resistance, and high deformation capacity, was examined in interlayer thicknesses of 7, 12, and 17 mm. Additionally, the impact of geotextile fabric positioning at the base and at 1/3 depth of the AC specimen was explored. Utilizing the Overlay Testing Machine (OTM) for evaluations, the research d
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More