The aim of this study is to synthesize an easy, non-toxic and eco-friendly method. Silver nanoparticles which were synthesized by leaf extract of mint were characterized by UV-Visible Spectroscopy which appears UVVisible spectrum of demonstrated a peak 448 nm corresponding to surface Plasmon resonance of silver nanoparticles, Fourier Transform Infrared Spectroscopy (FTIR); functional groups involved in the silver nanoparticles synthesis were identified, the presence of silver nanoparticles was confirmed by X-ray diffraction (XRD) and Atomic Force Microscope (AFM) analysis clearly illustrated that the shape of silver nanoparticles was spherical and the size of the silver nanoparticles has been measured as 55- 85 nm. Evaluation of its antimicrobial activity, the resulted showed that efficiency inhibitory activity against bacteria and fungi, silver nanoparticle showed a greater effect on Staphylococcus aureus at a concentration of 150 μg/ml which reached in diameter of the inhibition zone 18.5 mm. whereas in fungi, Candida utilisat a concentration of 150 μg/ml, which reached in diameter of the inhibition zone 18mm.
The dual nature of asphalt binder necessitates improvements to mitigate rutting and fatigue since it performs as an elastic material under the regime of rapid loading or cold temperatures and as a viscous fluid at elevated temperatures. The present investigation assesses the effectiveness of Nano Alumina (NA), Nano Silica (NS), and Nano Titanium Dioxide (NT) at weight percentages of 0, 2, 4, 6, and 8% in asphalt cement to enhance both asphalt binder and mixture performance. Binder evaluations include tests for consistency, thermal susceptibility, aging, and workability, while mixture assessments focus on Marshall properties, moisture susceptibility, resilient modulus, permanent deformation, and fatigue characteristics. NS notably im
... Show MoreBackground: Diagnosis and treatment planning can be difficult with conventional radiographic methods as the orthodontic-surgical management of impacted canines requires accurate diagnosis and precise localization of the impacted canine and the surrounding structures. This study was aimed to localize and evaluate weather there is any differences in the diagnostic information provided by multi-slice computed tomography three dimensional volumetric CT images and two dimensional reconstructed panorama images (derived from CT) in subjects with impacted maxillary canines. Materials and Methods: Thirty patients including 24 female and 6 male with mean age of 18 years with suspected unilaterally or bilaterally impacted maxillary canines were evalu
... Show MoreIn the current study, remote sensing techniques and geographic information systems were used to detect changes in land use / land cover (LULC) in the city of Al Hillah, central Iraq for the period from 1990 - 2022. Landsat 5 TM and Landsat 8 OLI visualizations, correction and georeferencing of satellite visuals were used. And then make the necessary classifications to show the changes in LULC in the city of Al Hillah. Through the study, the results showed that there is a clear expansion in the urban area from 20.5 km2 in 1990 to about 57 km2 in 2022. On the other hand, the results showed that there is a slight increase in agricultural areas and water. While the arid (empty) area decreased from 168.7 km 2 to 122 km 2 in 2022. Long-term ur
... Show MoreGroundwater is an essential source because of its high quality and continuous availability characterize this water resource. Therefore, the study of groundwater has required more attention. The present study aims to assess and manage groundwater quality's suitability for various purposes through the Geographical Information System GIS and the Water Quality Index WQI. The study area is located in the city of Baghdad in central Iraq, with an approximate area of 900 , data were collected from the relevant official departments representing the locations of 97 wells of groundwater in the study area for the year 2019, as it included physicochemical parameters such as pH, EC, TDS, Na, K, Mg, Ca, Cl, , and &nbs
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More