In this study 77 human isolates of Staphylococcus aureus were obtain from different clinical sources. The results showed that the number of isolates producing α-hemolysin was 32 isolates (41.55%) , while non- hemolysin producing was 45 isolates (58.45%) .The minimum inhibitory concentration (MIC) of methicillin which were 32 micrograms \ ml. The effect of CD-Cholesterol ,Cholesterol ,Cyclodextran(CD) ,Methicillin and Phosphate Buffer Saline(PBS) on α- hemolysin activity was study and the hemolytic Titer was:8 ، 32.768 ,65.536 ,
140.737.488.355.32 , 4.961408E + 25 respectively, while the effect of the same effect with Titer 67.108.864 and low Titer with PBS 3.96140812E + 25. The α – hemolysin toxin was partialy purified by ammonium sulfate precipitation. partial purified toxin was injected inside the cornea of rabbit's eye and the erosion of cornea formed with diameter: 8 mm after 8 hours of injection while the erosion of cornea which injected with CD-Cholesterol that mixed with partial purified toxin was 4 mm. CD-Cholesterol was used in treatment as a drops which added to the affected eye and led to a decrease in corneal erosion area from 8 mm to 4 mm.
This study is about the subject of exclusion of the application of foreign law as it violates the Islamic Sharia law in terms of Article (27) of the UAE Civil Transactions Law as amended in 2020, which before that date included all disputes involving a foreigner. According to the amendment referred to, the application of Islamic Sharia law shall be limited to civil transactions with the exclusion of personal status affairs.
The study concluded with many results, the most important of which is that the current text of Article (27) of the Civil Transactions Law as amended in 2020 is unable to explain what the judge may do in cases where the foreign law jurisdiction is referred to in one of the excluded texts, namely those related t
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreIn this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MorePerennial biofuel and cover crops systems are important for enhancing soil health and can provide numerous soil, agricultural, and environmental benefits. The study objective was to investigate the effects of cover crops and biofuel crops on soil hydraulic properties relative to traditional management for claypan soils. The study site included selected management practices: cover crop (CC) and no cover crop (NC) with corn/soybean rotation, switchgrass (SW), and miscanthus (MI). The CC mixture consisted of cereal rye, hairy vetch, and Austrian winter pea. The research site was located at Bradford Research Center in Missouri, USA, and was implemented on a Mexico silt loam. Intact soil cores (76‐mm diam. by 76‐mm long) were taken from the
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show More