Preferred Language
Articles
/
jih-1344
Study of Effect of Lactobacillus gasseri Filtrate on Growth of Some Pathogenic Fungi
...Show More Authors

The inhibitory effect concentrated filtrate of local Lactobaciilus

gasseri against Candida albicans and Trichophyton mentagrophytes, T  ruhrum  and Aspergillus  flavus which were isolated from infected cases  in human  beings, tested  using two methods  :well diffu  ion and

Mixed with the mold medium (Sabouraud agar).

The  results  showed  that the concentrated filtrate  of L. gasseri have

inhibitory effect against Cundida ulbicans, the inhibition  zone was 13 mm. As well  as, the concentrated  tiltrate inhibited, considerably Trichophyton   mentagrophytes,   T. rubrum   and   Aspergillus   jlavus growth   when  the  filtrate   was  mixed   with  Sabouraud   agar,  the inhibition activity was (57.6 , 41.2 , 66.6 )%  against Trichophyton mentagrophytes, T.rubrum andAspergillusflavu.'i respectively.

Results  showed  that concentrated filtrate of L.gasseri showed  strong activity  against  T. mentagrophytest spores gcrminatio!l  (the inhibition was 79.45%) by Mixing Lhfiltrate with the mold medium (Sabouraud agar).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Single Face Detection on Skin Color and Edge Detection
...Show More Authors

Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Bahraini Parliamentary Elections and their Impact on the Popular
...Show More Authors

الخلاصة Bahraini Parliamentary Elections and their Impact on the Popular Uprising) Bahrain has a distinguished constitutional and parliamentary experience, which distinct it from the other Gulf Cooperation Council (GCC) countries. Its experience in this area is the second after the experience of Kuwait to establish a system of government based on modern constitutional principles. As the government presented the Constitution to the Constituent Assembly elected by people and approved in 09/06/1973. After that, it witnessed the birth of the first parliament elected by the people in 1973, but the experiment did not last long and the parliament dissolved by Prince, and didn’t determine the period of the return of the working with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF
Publication Date
Tue Apr 22 2025
Journal Name
Al–bahith Al–a'alami
The Interactive Communication and its Reflection on Social Capital
...Show More Authors

The Internet makes the world like a small village. It has the ability to make groups of the same ideas, thoughts, and identity close to each other by gathering them in one place. It is a way to communicate and share information and opinion; shaping and sharing of comprising individuals with common interests and the participation of individuals in a fruitful dialogue results in achieving a set of goals promote ideas and mobilizing people about issues and events of common interests.

To address the relationship of the internet via interactive communication and its ability to achieve social capital and discuss issues and various social events, the study sees that the problem of the study could be formulated as follows:

Consid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Thu Nov 02 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Gallium Selective PVC Membrane Electrodes Based on Crown Ethers
...Show More Authors

Gallium  selective  e lectrodes   based  on  12-crown-4  (12C4)  and benzo-15-crown-5   (B15C5)  and  plasticizers   dioctyl  phenyl phosphonate   (DOPP),   dibutyl  phosphate  (DBP),  dibutyl  phthalate (DBPH)  in  PVC  matrix  membranes  are  constructed.  Specific properties  of  the electrodes  are  studied  including  calibration  curve, slope  detection limit, concentration  

+

 
... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref