Background: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten volunteers participated in the present study. Nutrient broth tubes have been prepared for MIC test, where various concentrations of the Gotu Kola extracts (0.5mg/ml, 1 mg/ml, 2 mg/ml, 3 mg/ml, 4 mg/ml, and 5 mg/ml) were added, respectively. The tubes incubated at 370C for 48h. Results:The MIC test shows that a concentration of 4 mg/ml have the ability to inhibit the growth of oral Lactobacilli and 8 mg/ml has the ability to inhibit the growth of S. aureuswhich may be due to asiaticoside and asiatic acid which are active ingredients that the leaves extracts consists of. There was no MIC for Streptococci. Conclusion:The Gotu Kola leaves extract can be used to inhibit the growth of some oral microorganisms at certain concentration. Keywords:Centella asiatica, oral microorganisms, antimicrobial activity, minimum inhibitory concentration.
يحتل موضوع الاستهلاك اهمية كبيرة في الدراسات الاقتصادية في حالتي السلم والحرب وذلك لارتباط هذا الموضوع بالانسان والمجتمع ولكونه احد مؤشرات مستوى الرفاهية الاقتصادية والاجتماعية وتزداد اهمية ضبط حركة هذا المتغير السلوكي والكمي في زمن الحرب اكثر مما هو عليه في حالة السلم، في هذا البحث تم استخدام بيانات احصائية عن الانفاق الاستهلاكي الخاص ونصيب الفرد من الدخل القومي اضافة الى الرقم القياسي لاسعار المس
... Show MoreThe current study entitled (the influence of heritage in the ceramic sculpture of the America Potter Paula Rice)
The study is based on four chapters:
Chapter I included structural find of clarification of the research problem and its importance, also included a mention of the research limits and the aim of this study, which is:
-Identify sculptures Ceramic affected ranges for Potter Paula Rice civilization heritage of intellectual and artistic, whether global or local.
-Trying to detect and intellectual influences the formalism of inherited and which resulted in the latest version of the unfinished ceramic artist.
-Did the artist callback method to the values inherent succeeded in the embodiment of the meaning of originali
This work presents the study of the dark current density and the capacitance for porous silicon prepared by photo-electrochemical etching for n-type silicon with laser power density of 10mw/cm2 and wavelength (650nm) under different anodization time (30,40,50,60) minute. The results obtained from this study shows different chara that different characteristic of porous diffecteristics for the different porous Silicon layers.
Objective(s): to determine the effectiveness of instruction intervention upon multipara women's practices to
control stress incontinence.
Methodology: A quasi-experimental study was carried out from (2nd) April, 2010 to 15th June, 2010. Nonprobability
(purposive sample) of (60) multiparous women was selected from Baghdad Teaching Hospital and AlElwia
Maternity Teaching Hospital in Baghdad city, the sample was divided into two groups (30) women were
considered as a study group, and another (30) were considered as the control group. An instructional intervention
was applied on the study group, while the intervention was not applied on control group. A questionnaire was
resolve as a tool of data collection to suit the p
This research aims to study and evaluate the reality of the Iraqi banks in terms of how they cope with the risks of the banking business, specifically banking operational risks, and to develop a model integrated to define, identify, measure and mitigate the impact of these risks on according to the Basel Committee requirements II about the dangers of Alchgal.uchir major search to the presence of weak results in the Iraqi banks in understanding and defining and measuring operational risks and not hedged properly, which avoids those banks operating losses as well as the results show there is a shortage in the equation of capital adequacy applied by the Iraqi banks because of non-observance of the minimum capital required to counter the ris
... Show Morethe films of cdse pure and doped with copper ratio glass substrate effect od cucomcentration technique thikness doped with copper is an anonmg and the density of state increases
The study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More