Four alkaloids compounds were extracted from the fruits and leaves, of plant known locally as (Anab AI-Thebe Solanum nigram), by various solvents systems, from an earlier study by the researcher. DNA tested its effect in plasmid PBR322 deportation method using Gel Electrophoresis. Results showed that two of those extract for full effectiveness digestible pieces of RNA and DNA plasmid, and digestive partly of the other alternatives. That could prove results indicate that this type of alkaloids consist of biological effectiveness of anti-twnors, through DNA digestion spare low molecular weight, as well as their effectiveness as antibacterial which had been found previously.
This work deals with separation of the aromatic hydrocarbons benzene, toluene, and xylene (BTX) from reformate. The separation was examined using adsorption by molecular sieve zeolite 13X in a fixed bed process. The concentration of aromatic hydrocarbons in the influent and effluent streams was measured using gas chromatography. The effect of flow rate and bed length of adsorbent on the adsorption of multicomponent hydrocarbons and adsorption capacity of molecular sieve was studied. The tendency of aromatic hydrocarbons adsorption from reformate is in the order: benzene >toluene>xylenes.
A total of 37 Staphylococcus epidermidis isolates, isolated from corneal scraping of patients with bacterial keratitis and 20 isolates from healthy eyes (as control) (all isolates, isolated from, Ibn Al- Haietham eye hospital / Baghdad), were tested for slime production, 52.63% of all isolates were positive-slime production (23 isolates from patients and 7 isolates from controls). It was found that positive-slime producing S. epidermidis were exhibited a high resistance to antibiotics as compared to negative-slime producing isolates.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Efficient and cost-effective drilling of directional wells necessitates the implementation of best drilling practices and advanced techniques to optimize drilling operations. Failure to adequately consider drilling risks can result in inefficient drilling operations and non-productive time (NPT). Although advanced drilling techniques may be expensive, they offer promising technical solutions for mitigating drilling risks. This paper aims to demonstrate the effectiveness of advanced drilling techniques in mitigating risks and improving drilling operations when compared to conventional drilling techniques. Specifically, the advanced drilling techniques employed in Buzurgan Oil Field, including vertical drilling with mud motor, managed pres
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show More