Preferred Language
Articles
/
jih-1344
Study of Effect of Lactobacillus gasseri Filtrate on Growth of Some Pathogenic Fungi
...Show More Authors

The inhibitory effect concentrated filtrate of local Lactobaciilus

gasseri against Candida albicans and Trichophyton mentagrophytes, T  ruhrum  and Aspergillus  flavus which were isolated from infected cases  in human  beings, tested  using two methods  :well diffu  ion and

Mixed with the mold medium (Sabouraud agar).

The  results  showed  that the concentrated filtrate  of L. gasseri have

inhibitory effect against Cundida ulbicans, the inhibition  zone was 13 mm. As well  as, the concentrated  tiltrate inhibited, considerably Trichophyton   mentagrophytes,   T. rubrum   and   Aspergillus   jlavus growth   when  the  filtrate   was  mixed   with  Sabouraud   agar,  the inhibition activity was (57.6 , 41.2 , 66.6 )%  against Trichophyton mentagrophytes, T.rubrum andAspergillusflavu.'i respectively.

Results  showed  that concentrated filtrate of L.gasseri showed  strong activity  against  T. mentagrophytest spores gcrminatio!l  (the inhibition was 79.45%) by Mixing Lhfiltrate with the mold medium (Sabouraud agar).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Weakly Quasi-Prime Module
...Show More Authors

  In this work we shall introduce the concept of weakly quasi-prime modules and give some properties of this type of modules.

View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
On Semi-p-Compact Space1
...Show More Authors

The purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Fuzzy Internal Direct Product
...Show More Authors

The main aim of this paper is to introduce the concept of a Fuzzy Internal Direct Product of fuzzy subgroups of group . We study some properties and prove some theorems about this concept ,which is very important and interesting of fuzzy groups and very useful in applications of fuzzy mathematics in general and especially in fuzzy groups.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Educating societies on sustainable development
...Show More Authors

To move forward on the path of goodness and peace, we must realize that, in the midst of the great diversity of cultures and forms of human life in the world, that we form one human nation, which God Almighty created to worship Him on His earth and under His heavens and to enjoy His bounties and natural resources that God Almighty has bestowed upon that nation. On one land, and it is governed by one common destiny. Every country has been endowed with a natural resource by God Almighty that distinguishes it from the other country to live in prosperity if these wealth are distributed equally among the members of the same society and societal justice is achieved. We must join together to work for the establishment of a sustainable global commu

... Show More
View Publication
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Semi-p-Proper Mappings
...Show More Authors

  The aim of this paper is to introduce a new type of proper mappings called semi-p-proper mapping by using semi-p-open sets, which is weaker than the proper mapping. Some properties and characterizations of this type of mappings are given.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
On treshold relation & thier application
...Show More Authors

in this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R

View Publication Preview PDF
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
On large-hollow lifting modules
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 08 2021
Journal Name
Journal Of Interdisciplinary Mathematics
On regular δ-semi.open space
...Show More Authors

It is shown that if a subset of a topological space (χ, τ) is δ-semi.closed, then it is semi.closed. By use this fact, we introduce the concept regularity of a topological space (χ, τ) via δ-semi.open sets. Many properties and results were investigated and studied. In addition we study some maps that preserve the δ-semi.regularity of spaces.

View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref