In this study 77 human isolates of Staphylococcus aureus were obtain from different clinical sources. The results showed that the number of isolates producing α-hemolysin was 32 isolates (41.55%) , while non- hemolysin producing was 45 isolates (58.45%) .The minimum inhibitory concentration (MIC) of methicillin which were 32 micrograms \ ml. The effect of CD-Cholesterol ,Cholesterol ,Cyclodextran(CD) ,Methicillin and Phosphate Buffer Saline(PBS) on α- hemolysin activity was study and the hemolytic Titer was:8 ، 32.768 ,65.536 ,
140.737.488.355.32 , 4.961408E + 25 respectively, while the effect of the same effect with Titer 67.108.864 and low Titer with PBS 3.96140812E + 25. The α – hemolysin toxin was partialy purified by ammonium sulfate precipitation. partial purified toxin was injected inside the cornea of rabbit's eye and the erosion of cornea formed with diameter: 8 mm after 8 hours of injection while the erosion of cornea which injected with CD-Cholesterol that mixed with partial purified toxin was 4 mm. CD-Cholesterol was used in treatment as a drops which added to the affected eye and led to a decrease in corneal erosion area from 8 mm to 4 mm.
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu
... Show MoreThis study was conducted to investigate activity and some kinetic
and thermodynamic parameters of adenosine deaminnse (ADA)in
serum in patient affected with P-thalassaemia and compared with that of healthy individuals .Serum AD levels were found to be significantly higher in patient with P-thalassaemia (98±9.15 IU/L) than in healthy individuals (22± 2.04 IUIL)the study was carried in optimum pH value 6.5 and 37c by which the enzyme possess highest activity .The study was concentrated to comprehensive determina
... Show MoreThis research aims at studying the relation between fair value and the Financial Reports Quality to achieve a number of aims such as :-
1- Throw light on the problems of the measurement that depends on the historic cost as it paves the way towards the method of the fair value in the accounting measurement.
2-Give a general definition for fair value in the accounting via analyzing the theoretical aspects that relates the subject and the scientific bases on which the relating accounting treatment depend.
3- Exhibit the characteristics that could be added by the fair value to the accounting Information .
The study problem is summarized in that the e
... Show MoreIn this paper a method to determine whether an image is forged (spliced) or not is presented. The proposed method is based on a classification model to determine the authenticity of a tested image. Image splicing causes many sharp edges (high frequencies) and discontinuities to appear in the spliced image. Capturing these high frequencies in the wavelet domain rather than in the spatial domain is investigated in this paper. Correlation between high-frequency sub-bands coefficients of Discrete Wavelet Transform (DWT) is also described using co-occurrence matrix. This matrix was an input feature vector to a classifier. The best accuracy of 92.79% and 94.56% on Casia v1.0 and Casia v2.0 datasets respectively was achieved. This pe
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreThe current research seeks to identify the most important humanitarian issues of a sacred and very important group in all the heavenly religions and human societies, namely the elderly, to identify their significant problems and health problems, and What are the effects of these problems on their mental health and which is the ultimate goal of human resources in All parts of the world? The study relied on what is available from the sources in the literature starting from the messages of heaven and the Islamic religion followed with humanitarian, social, legal and psychological postulates. The research included four systematic chapters included the definition research and identification of the problem, importance, objectives and terminolo
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show More