In this study 77 human isolates of Staphylococcus aureus were obtain from different clinical sources. The results showed that the number of isolates producing α-hemolysin was 32 isolates (41.55%) , while non- hemolysin producing was 45 isolates (58.45%) .The minimum inhibitory concentration (MIC) of methicillin which were 32 micrograms \ ml. The effect of CD-Cholesterol ,Cholesterol ,Cyclodextran(CD) ,Methicillin and Phosphate Buffer Saline(PBS) on α- hemolysin activity was study and the hemolytic Titer was:8 ، 32.768 ,65.536 ,
140.737.488.355.32 , 4.961408E + 25 respectively, while the effect of the same effect with Titer 67.108.864 and low Titer with PBS 3.96140812E + 25. The α – hemolysin toxin was partialy purified by ammonium sulfate precipitation. partial purified toxin was injected inside the cornea of rabbit's eye and the erosion of cornea formed with diameter: 8 mm after 8 hours of injection while the erosion of cornea which injected with CD-Cholesterol that mixed with partial purified toxin was 4 mm. CD-Cholesterol was used in treatment as a drops which added to the affected eye and led to a decrease in corneal erosion area from 8 mm to 4 mm.
In a world that is accelerating day after day in the context of technical globalization, this speed appeared in the issue of electronic currency trading, which is linked to banks all over the world, then the virtual bitcoin coin appeared, and its place is the Internet, and contains an encryption system that is not related to the center or the bank. This coin spread widely and was invested by major companies.
In legislative terms, this currency was not granted its right or proper organization, while jurisprudence was dealt with in a simple way, as this coin needs further studies. This research explains the challenges arising from the concept of this currency to determine the legal nature that enters under it, in addition to discus
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThe main aim of this paper is to explain the effect of the aggregation accounting information on the financial, investment, and operational, managerial decision-making and the evaluation of the financial statements after aggregate. The problem of this study is represented in administrative decision-making that takes place under differentiated accounting systems operating within a governmental economic unit that seeks at the same time to achieve a unified vision and goals for the organization. This study was conducted at the College of Administration and Economics /University of Baghdad, and it represents a sample from a community of governmental economic units that apply differentiated accounting systems. The study method is repr
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreThe Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show More The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_
The research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More