Isolation and identification of bacterial isolates were carried out according to the morphology and biochemical characteristics on one hundred and twenty stool specimens collected from children under five years old via using biochemical tests and Api 20E compact system for further confirmation. Bacterial isolates were distributed as (34.48, 20.68, 5.17,0.86) % for Escherichia coli, Salmonella typhi ,Enterobacter aerogenos, Citrobacter freundii and Hafnia alvei respectively and 9.48 % for each Proteus mirabilis, Pseudomonas aeruginosa and Klebsiella Pneumonia. As well as, 2.58% for both Shigella sonnei and Serratia marcescens. Antibiotic susceptibility test for 116 bacterial isolates was performed towards 20 antibiotics types using disk d
... Show MorePathological blood clot in blood vessels, which often leads to cardiovascular diseases, are one of the most common causes of death in humans. Therefore, enzymatic therapy to degrade blood clots is vital. To achieve this goal, bromelain was immobilized and used for the biodegradation of blood clots. Bromelain was extracted from the pineapple fruit pulp (Ananas comosus) and purified by ion exchange chromatography after precipitation with ammonium sulphate (0-80 %), resulting in a yield of 70%, purification fold of 1.42, and a specific activity of 1175 U/mg. Bromelain was covalently immobilized on functionalized multi-walled carbon nanotubes (MWCNT), with an enzyme loading of 71.35%. The results of the characterization of free and immobilized
... Show MoreSegmentation of real world images considered as one of the most challenging tasks in the computer vision field due to several issues that associated with this kind of images such as high interference between object foreground and background, complicated objects and the pixels intensities of the object and background are almost similar in some cases. This research has introduced a modified adaptive segmentation process with image contrast stretching namely Gamma Stretching to improve the segmentation problem. The iterative segmentation process based on the proposed criteria has given the flexibility to the segmentation process in finding the suitable region of interest. As well as, the using of Gamma stretching will help in separating the
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to
... Show MoreThe theatre is one of the main pillars of the human aesthetic thinking as it contains logical explanations for the public human life aspects outside time and environment. When we find that the directive philosophical thinking moving away from the stylistic constants and the virtual laws in taboos that control the accomplishment in terms of the traditional shapes, the employment and the theatrical reception. Some directors moved in post-modernism concepts in a perceptive that liberates thought from its natural context in thinking into an innovative perceptive. The aesthetic images are the basic premise in the prohibition of the philosophical thinking interpretation in order to move the directive thinking and this movement depends on the v
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreThe image of television dominates the cognitive and artistic motivations. It is the formulation of ideas and visions along with its documentary ability. It is the main element in television work as it is a story that is narrated in pictures. Therefore, attention to image building is a major point of gravity in the work structure as a whole. On the image is the element carrying all aesthetic and expressive values of news and information directly to the hints that work to stimulate and stir the imagination of the recipient to evoke mental images added to the visual images to deepen the meanings.
All visual arts carry elements and components that follow in a particular pattern to give special meanings and specific connotations. However,
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More