Preferred Language
Articles
/
jih-1774
Antimicrobial activity of some plants extracts on bacteria isolated from acne vulgaris patients
...Show More Authors

Background: Acne is a cutaneous pleomorphic disorder skin disease most frequently occurring during the adolescent in ages of 12-24, with estimated  percentage ( 85%) . There are different ways to treat acne such as  using of antibiotics  , herpes , and mixing treatments .

Methods : Antibacterial activity  of  four concentrations (100,50,25,12.5)mg /ml of  alcoholic  and cold  aqueous  crude extracts of Cinnamon(Cinnamomum verum ), Henna (Lawsonia inermis ) , Lupine (Lupinus luteus) were studied against aerobic and  an aerobic bacteria isolated from inflamed and discharging pus  from thirty Iraqi acne vulgaris patients refer to dermatology unit  at AL-Kindy Hospital from December 2016  to March 2017.All information (age, sex ,diseases and using topical treatments) were recorded .The bacterial isolates  were identify using morphological characteristics, biochemical tests and  the  Vitek-2 compact system.

Results: Among (30 )Acne samples taken, 8 (26.7%) samples were from males age range (19-33) years and 22(73.3%) were from females within age (17-29)years . twenty five (83%) samples  were culture positive, and only  (17%) of samples revealed no growth .Most frequent  bacteria which isolated  (aerobically) from acne patients were  Staphylococcus aureus ( 60%), Staphylococcus epidermidis (20%),  Escherichia coli  (8% ),  Pseudomonas aeruginosa  (4%), and an aerobic bacterial isolates  were Propionibacterium acnes  (8%) isolates.

 

Antibiotic sensitivity tests were performed against, Ampicillin, Clindamycin, Gentamicin, Cotrimoxazole, Erythromycin, Vancomicine, Tetracycline, Doxycycline, and Azithromycin.All bacterial isolates were resistance to Ampicillin. Staphylococcus aureus and S. epidermidis were sensitive (100%) to Doxycycline and Azithromycin, P. acne were also highly sensitive to these two antibiotics (95.5%,97.1%) respectively, while E. coli and P. aeruginosa were (100%) resistance to these antibiotics. Gentamicin and tetracycline were susceptible by most of the study isolates except for P. aeruginosa which was very resistance to CN and TE (100%&94.8%) respectively.

The antimicrobial potential of cold water and alcoholic crude extracts of Cinnamon (Cinnamomum verum ), Hinna (Lawsonia inermis), and Lupine (Lupinus luteus), in concentrations (100,50,25,12.5) mg/ml against the gram positive and gram negative isolates were tested through a well-diffusion method.

Alcoholic extract of  Henna leaves in concentration  (100mg/ml) showed high inhibitory activity  to all isolates compared with the aqueous extract and the all concentration of cinnamon aqueous and alcoholic extracts ,while  lupine extracts  had no effect on all  bacterial isolates   .

Conclusion: Gram-positive bacteria were the most common microorganisms involved  in  acne infection. There are variations in the incidence of acne infection in relation to sex, age; Alcoholic extract of the Henna leaves could be used to treat acne.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Wed Sep 08 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Strategic tax planning and its impact on reducing tax evasion
...Show More Authors

Taxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 24 2018
Journal Name
2018 Aiaa/ceas Aeroacoustics Conference
Mimicking the serration effects on aerofoil by leading edge blowing
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Mar 28 2020
Journal Name
Iraqi Journal Of Science
A Study on n-Derivation in Prime Near – Rings
...Show More Authors

The main purpose of this paper is to show that zero symmetric prime near-rings, satisfying certain identities on n-derivations, are commutative rings.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Low Energy Consumption Scheme Based on PEGASIS Protocol in WSNs
...Show More Authors

Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Role socialization family erroneous and its impact on criminal behavior
...Show More Authors

The correct and sincere process of socialization is working on appropriate social climate in
which this process is the provision, and the climate is achieved in the presence of a positive
environment free of negatives and contradictions, but when there is a socialization processes
inadequate and contradictory was not based on the principles of punishment and reward nor a
balance between methods soft and intensity of treatment and interaction with small and
adolescent does not require intensive social care formulas do not create the conditions
essential items required by the successful and effective socialization, the young and the young
people who are going through in such Altanisah and educational operations will be

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
Nativa,
Benthic invertebrate at three sites on the Tigris River, Iraq
...Show More Authors

The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch

... Show More
Scopus