Preferred Language
Articles
/
jih-1774
Antimicrobial activity of some plants extracts on bacteria isolated from acne vulgaris patients
...Show More Authors

Background: Acne is a cutaneous pleomorphic disorder skin disease most frequently occurring during the adolescent in ages of 12-24, with estimated  percentage ( 85%) . There are different ways to treat acne such as  using of antibiotics  , herpes , and mixing treatments .

Methods : Antibacterial activity  of  four concentrations (100,50,25,12.5)mg /ml of  alcoholic  and cold  aqueous  crude extracts of Cinnamon(Cinnamomum verum ), Henna (Lawsonia inermis ) , Lupine (Lupinus luteus) were studied against aerobic and  an aerobic bacteria isolated from inflamed and discharging pus  from thirty Iraqi acne vulgaris patients refer to dermatology unit  at AL-Kindy Hospital from December 2016  to March 2017.All information (age, sex ,diseases and using topical treatments) were recorded .The bacterial isolates  were identify using morphological characteristics, biochemical tests and  the  Vitek-2 compact system.

Results: Among (30 )Acne samples taken, 8 (26.7%) samples were from males age range (19-33) years and 22(73.3%) were from females within age (17-29)years . twenty five (83%) samples  were culture positive, and only  (17%) of samples revealed no growth .Most frequent  bacteria which isolated  (aerobically) from acne patients were  Staphylococcus aureus ( 60%), Staphylococcus epidermidis (20%),  Escherichia coli  (8% ),  Pseudomonas aeruginosa  (4%), and an aerobic bacterial isolates  were Propionibacterium acnes  (8%) isolates.

 

Antibiotic sensitivity tests were performed against, Ampicillin, Clindamycin, Gentamicin, Cotrimoxazole, Erythromycin, Vancomicine, Tetracycline, Doxycycline, and Azithromycin.All bacterial isolates were resistance to Ampicillin. Staphylococcus aureus and S. epidermidis were sensitive (100%) to Doxycycline and Azithromycin, P. acne were also highly sensitive to these two antibiotics (95.5%,97.1%) respectively, while E. coli and P. aeruginosa were (100%) resistance to these antibiotics. Gentamicin and tetracycline were susceptible by most of the study isolates except for P. aeruginosa which was very resistance to CN and TE (100%&94.8%) respectively.

The antimicrobial potential of cold water and alcoholic crude extracts of Cinnamon (Cinnamomum verum ), Hinna (Lawsonia inermis), and Lupine (Lupinus luteus), in concentrations (100,50,25,12.5) mg/ml against the gram positive and gram negative isolates were tested through a well-diffusion method.

Alcoholic extract of  Henna leaves in concentration  (100mg/ml) showed high inhibitory activity  to all isolates compared with the aqueous extract and the all concentration of cinnamon aqueous and alcoholic extracts ,while  lupine extracts  had no effect on all  bacterial isolates   .

Conclusion: Gram-positive bacteria were the most common microorganisms involved  in  acne infection. There are variations in the incidence of acne infection in relation to sex, age; Alcoholic extract of the Henna leaves could be used to treat acne.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Enhanced Cartooning System Based on Dynamic Augmented KMCG and LIP
...Show More Authors

The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.

View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Optimal CPU Jobs Scheduling Method Based on Simulated Annealing Algorithm
...Show More Authors

     Task scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (2)
Scopus
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Orthogonal Generalized Symmetric Higher bi-Derivations on Semiprime Г-Rings .
...Show More Authors

In this paper a Г-ring M is presented. We will study the concept of orthogonal generalized symmetric higher bi-derivations on Г-ring. We prove that if M is a 2-torsion free semiprime    Г-ring ,  and  are orthogonal generalized symmetric higher bi-derivations  associated with symmetric higher bi-derivations   respectively for all n ϵN.

View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF