Hyaluronidase is an enzyme that breaks down primarily hyaluronic acid, thereby disrupting the structural integrity of the extracellular matrix (ECM) found in connective tissues, which is considered a virulence factor. The aim of this research was to study the effect of a plant-active compound (vasicine) that was separated from a plant sample as an inhibitor agent for the hyaluronidase enzyme that was isolated from Staphylococcus aureus, which is considered a virulence factor. 120 samples were randomly isolated from infected burns. The isolates showing highly hydrolyzed zones were identified. Cell growth as well as hyaluronidase activity are measured spectrophotometrically by the turbidity reduction assay. The results showed tha
... Show MoreIonic liquids (ILs) and deep eutectic solvents (DESs) have been found to be highly effective as electrolytes in TiO2 NTAs-graphite cells when combined with additives that enhance conductivity by reducing the viscosity of these liquids. The presence of CaCl2.6H2O: Acetamide DES with DI water as an additive resulted in a cell voltage of 1.31V and an internal resistance of 19 ohm. This can be attributed to the concentration and quality of the ionic species. The cells exhibited an interesting response to the AlCl3-chloroacetamide IL with dichloromethane DCM as an additive, with a cell voltage of 1.81V and an internal resistance of 5.0 ohm. Once again, this is influenced by the quality and concentra
... Show MoreSecurity plays a vital role in various domains, including blockchain technology. The Blockchain serves as a secure data structure for storing transactional records. Hash functions are employed in cryptography to ensure integrity and authentication within the blockchain. The widely used SHA256 algorithm has faced recent attacks, prompting the development of stronger hash functions. This paper presents a novel modification approach to enhance the performance of SHA256 by introducing an extended mechanism for generating a 288-bit message digest and reducing the number of rounds to 44 instead of 64 while preserving the diffusion of data through its complex iterative process, which involves multiple rounds of bitwise and logical operations. T
... Show MoreA series of novel pyrazoline derivatives 5-13 were synthesized in three steps from isatin, with yields ranging from 40 to 72% over the multistep procedure. The first step included the condensation of isatin with p-aminoacetophenone to afford the corresponding Schiff base 1 in a 75% yield. In the second step, the enolate form of Schiff base 1 was reacted with different aromatic aldehydes (benzaldehyde, p-nitrobenzaldehyde, and p-chlorobenzaldehyde) to give the title chalcone derivatives 2-4 in 60-72 yields. In the third step, pyrazoline derivatives 5-13<
... Show MoreHigh antibiotic resistance among Pseudomonas aeruginosa could be viewed as the primary cause of nosocomial infections. In this study, 60 isolates of Pseudomonas aeruginosa were isolated from urine, sputum, burn, ear and wounds swab. The major goal was to determine the relationship between MexX and MexY and the resistance of MDR P. aeruginosa to many drugs. Prevalence of multidrug resistant (MDR) Pseudomonas aeruginosa was 22 isolates (36.66%) and 38 isolates (63.34%) were found to be non-MDR isolates. Moreover, molecular detection of MexX and MexY genes was done for MDR isolates.MexY gene was found in all MDR isolates and MexX gene was detected in 2
... Show MoreResults of the current study demonstratedthat out of eighty-three isolatesof Pseudomonas aeruginosa,only twenty-five isolateswere resistant to five different antibiotics (of different classes) that were consequentlyconsideredmultidrug resistant isolates.These isolates developed variable susceptibility toward Eucalyptuscamaldulensisleavesoil (ECO). GC-MS analysis of ECOrevealed that the aromatic oil eugenol is the major constituent.However, the most frequent MIC was 0.39 µg/ml, while the lowest frequent MIC was 3.125 µg/ml.Moreover, this oil at ½ MIC (0.195µg/ml) increased the gene expression of exoU. Itis concluded from the outcomes of the studythat ECOmay cause severe damagewhen used to treat infections ca
... Show MoreThe lightweight block cipher is an encryption technique with negligible computational overhead. Despite its advantages, it faces a substantial challenge. Correct handwriting of the script code for the cipher scheme is a challenge for programmers. In this research, we suggest a new graphical domain-specific modeling language to make it easier for both non-technical users and domain specialists to implement lightweight block cipher schemes. The proposed language, called LWBCLang, is a modular and extensible language that offers graphical components for constructing three essential types of inner block cipher structures. Seven different methods of keystream generation and all the tests of the NIST suite with performance analysis are provide
... Show MoreIn this article, two-dimensional unsteady incompressible viscous nanofluids magneto-hydrodynamic (MHD) flow among two parallel plates extended infinitely is investigated. The equations that results from the use of similarity transformations for non-linear partial differential system are solved by the new algorithm. The important key to this construct is the derivatives that appear as coefficients in the power series. The effects of apparent physical parameters on velocity concentration and temperature distributions are described using a schematic diagram and interpreted physically. The effects of apparent physical parameters on concentration, temperature, and velocity distributions are described by graphs. For the flow of nanofluids, the
... Show MoreThis article introduces the concept of strongly-WH module which is a proper generalized of Hopfian modules. A module is called strongly-WH, briefly -WH if, any -small surjective -endomorphism of is an automorphism. We specify and provide some properties of this concept. Furthermore, we have established connections between strongly-WH modules and various other concepts. We demonstrate that every strongly-WH module is -weakly Hopfian. As well as, we provide cases in which the concepts of WH, -weakly Hopfian, and strongly-WH modules are equivalent.
Postmenopausal women with hypertension may be linked with cardiovascular risk factors like visceral obesity. Changes in antioxidant levels and lipid profile are considered risk factors concerning heart disease that arises during postmenopausal. Ninety Iraqi women aged between 53-70 years, sixty women with postmenopausal hypertension, and thirty healthy postmenopausal women were selected as control for this study. Blood samples were taken to measure some antioxidants through enzyme-linked immune sorbent assay (ELISA) and lipid profile by enzymatic technique. Results showed that the mean of catalase levels was significantly lower in patients (257.62±6.99) compared towith the control group (499.30±13.08). Glutathione results were si
... Show MoreIn response to the growing interest in green chemistry and the adoption of environmentally friendly and cost-effective compounds in industrial and agricultural applications, this study focuses on exploring the potential of natural compounds. Specifically, the research investigates the corrosion inhibitory properties of Iraqi plum tree gum. The natural gum is characterized using Fourier transform infrared spectroscopy to identify its functional groups and atomic force microscopy (AFM) for further analysis. The electrochemical polarization technique was used to study corrosion measurements for carbon steel (C.S) in saline solution and in the presence of the inhibitor (Plum Tree Gum) in different concentration solutions. The findings reveal
... Show MoreMaking use of the geomagnetic field and the electron density data from the ionosphere observed by the three Swarm satellites that were recorded through 2020, 303 days before and 62 days after the Samos earthquake were investigated, which occurred at 11:51 UTC on Oct 30, 2020, happened in an offshore location around 60 km southwest of Izmir, western Turkey, and 16 km north of Samos Island, Greece 37.897°N 26.784°E. Magnetic and electron density data abnormalities were examined using the Analysis of Magnetic Swarm (AMSW) and the Analysis of Electron Density Swarm (AEDSW) algorithms. The quiet time abnormalities during nighttime within the Dobrovisky region showed exciting results. It showed an enhancement in the cumulative number of trac
... Show MoreAlthough deep learning-based object detection has produced excellent performance, there are still many issues with images from real-world capture, including rotating jitter, blurring, and noise deletion. The impact of these issues on object detection is significant. The main goal of this paper is to develop a real-time “You Only Look Once” (YOLOv3) algorithm to detect traffic signs. Compared to all other object detection algorithms, the YOLO method has a number of benefits. In contrast to different algorithms, YOLO looks at the image entirely by making predictions of the bounding boxes utilizing a convolutional neural network (CNN), determining the probability of each class for these boxes, and detecting the image more quickly. The p
... Show MoreThis article presents the theoretical analysis of the nonlinear behavior of the blood flow through an angled arterial segment with overlapping stenosis. A mathematically created time-variant stenosis emerges from the formation of arterial narrowing brought on by atheroma. An elastic cylindrical tube with a moving wall is used to represent the artery, and the Casson liquid is used to simulate blood that flows through it. The nonlinear elements that arise in the equations, govern blood flow are taken into account. The impact of the pulsatile pressure gradient that caused by the regular heartbeat on the flow process in the stenosed artery is demonstrated mathematically. By employing the boundary conditions, the present analytical tech
... Show MoreA few decades ago, quality assessment was a significant challenge in agriculture, even with tiny amounts of agricultural products. They are subject to diseases, pesticides, and environmental variables that have led to challenges to quality and safety. The quality evaluation of these items serves a crucial function in quality control and increases productivity before consumption. This paper proposes a deep neural network for solving Indian tomato diversity problems based on the assessment of their features. This study was carried out using four different categories of south Indian cherry tomatoes, i.e., spot, BER, calyx, and n
... Show MoreWith the enormous growth and advancement of the computer industry, it is critically necessary to transmit a large amount of encrypted multimedia data to prevent third parties from attacking one's privacy or misbehaving. This study proposes a new encryption strategy for preserving original images. It is highly effective and has been shown to be resilient against impulsive noise and loss of data. At first, some random data is entered within the perimeter of the image. Then, three rounds of high-speed scrambling and adaptive diffusion for pixels are carried out to mix the contiguous pixels at random and distribute the newly placed data throughout the image. The suggested encryption method can be used to encrypt original images in any form o
... Show MoreThe Dwarf Mongoose Optimization Algorithm (DMO) is inspired by the behaviour of Dwarf Mongoose which can strike the ideal balance throughout research between exploration and exploitation. In this article, we combine algorithms of the Dwarf Mongoose Optimization Algorithm and the Nelder-Mead Algorithm (DMONM). In addition, the statistically evaluated functions is utilized by calculating the average and the standard deviation values that are used to validate the suggested algorithm's performance. The experimental results are on high-efficiency optimization functions with various dimensions. The hybrid algorithm produces good, encouraging, and better outcomes than the original algorithms. The results show that the proposed algorithm
... Show MoreA graph with vertices and edges is said to be antimagic if its edges can be labeled with such that the weights of vertices of are pairwise distinct. The graceful labeling of a graph with edges is an assignment of integers from the set to the vertices of , such that no two vertices receive the same label, where each edge is assigned the absolute value of the difference between the labels of its end vertices and the resulting edge labeling runs from to is inclusive. Moreover, if the induced edge labeling is simultaneously antimagic, that is, the sums of the labels of all edges incident to a given vertex are pairwise distinct for different vertices, we call the graceful labeling graceful antimagic. In this study, we will
... Show MorePeriodontal disease, also known as gum disease, is a chronic inflammatory condition that affects the supporting structures of the teeth, including the gums and underlying bone. It is primarily caused by a bacterial infection resulting from poor oral hygiene practices. The main objectives of the current study were to synthesize iron oxide nanoparticles (Fe2O3-NPs) and their characteristics were analyzed through UV, SEM, and X-ray analysis. Additionally, the dispersion of the synthesized NPs was investigated using UV and TEM techniques. The study also aimed to assess the kinetic behavior and the impact of Fe2O3-NPs on catalase activity in the saliva of the patient and control groups. The
... Show MoreSince the first established library in the 7th century B.C., libraries have played a main role in civilization development due to their ability to help humans reach the required information easily. However, in the last decades, after the huge propagation of information from various sources, including the addition of books, other data types such as audio, video, and images have emerged. Therefore, finding an integrated system to manage this huge amount of library data became necessary. As a result, the integrated library system (ILS) improved its efficiency and ability to manage various and enormous amounts of data in addition to following the lending processes and inventory management. There are many commercial and open-source i
... Show MoreIn this study water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals) using N-acetyl cysteine as a stabilizer were prepared to investigate the utility of quantum dots (QDs) in distinguishing damaged DNA, (extracted from blood samples of leukaemia patients), from intact DNA (extracted from blood samples of healthy individuals) to be used for biosensing application. Based on the optical characterization of the prepared QDs, the XRD results revealed the formation of the NAC-CdTe-QDs with a grain size of 7.1nm. Whereas, the SEM test showed that the spherical size of the NAC-CdTe-QDs lies within 11~33nm. NAC-CdTe-QDs have superior PL emission properties at of 550nm and UV-Vis absorption peak at 300nm. The energy g
... Show MoreTin oxide pure and manganese oxide doped (SnO2:Mn2O3) films were grown on a glass substrate in vacuum by pulsed laser deposition (PLD) technique (using Nd: YAG Laser) at different ratios of Mn2O3 (0, 3, 5, 7, 9) % wt. The structural and optical properties were studied. The X-ray diffraction (XRD) studies showed the structure nature of the films to be polycrystalline and rutile tetragonal. The optical transmittance spectra and optical constants of the prepared thin films, such as extinction coefficient (k), refractive index (n), and real (εr) and imaginary parts (εi) of the dielectric constant, were investigated. The values of the energy band gap incre
... Show MoreNowadays, almost everyone is glued to their phones. It turns out that the fear of being without your phone has a fancy name: nomophobia. Researchers can now analyze our phone usage using data mining techniques to determine how much we rely on them. They can monitor everything from screen time and social media activity to email habits and app addiction. This information assists us in understanding the impact of technology on our daily lives and may even lead to new interventions or treatment options for those who suffer from nomophobia. Nomophobia, like addiction, progresses through multiple aspects such as initiation, affirmation, need, and dependency. It also manifests in a variety of ways, including socially, physiologically, and physi
... Show MoreIn this article, the lattice Boltzmann method with two relaxation time (TRT) for the D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where dissip
... Show MoreIn this paper, we discuss estimating the fuzzy parameters of the Exponential-Rayleigh distribution using the Progressive Censored sample for the Rank Set method to become the proposed Rank Set Sampling estimation Method (RSSEM) in Censoring sample using the Newton-Raphson method to determine the parameter estimate values. Then utilizing Al Karkh General Hospital-Ministry of Health and Environment in Iraq for providing information about the actual data for COVID-19. To ascertain the Chi-square test was used. The distribution of the using sample is the Exponential-Rayleigh distribution. (ER). Then, we estimate the probability density function, hazard function, and survival function. To follow the estimat
... Show MoreType 2 diabetes mellitus continues to pose a significant global health concern, warranting increased attention. This metabolic disorder is influenced by various factors, such as lifestyle, diet, environment, and genetics. While several approaches have been developed to address the incidence of type 2 diabetes mellitus, current treatments remain inadequate and necessitate further improvement. In this study, our objective was to assess the potential antidiabetic efficacy of anthraquinone glycosides present in rhubarb (specifically physcion diglucoside and aloe-emodin-8-glucoside) as potential inhibitors of the sodium-glucose cotransporter-2. We employed an in silico study to evaluate their inhibitory properties. The computational predictio
... Show MoreWe introduce a new flexible distribution four-parameter which is called [0,1]Truncated Exponentiated Exponential Burr type X distribution ([0,1] TEE-BX). Using binomial series expansion and exponential expansion, the new distribution is expanded by four parameters. We derive moments, moment generating function, quantile function, order statistics and the Rényi entropy. The maximum likelihood estimation method is used to estimate the parameters of the proposed TEE-BX model [0,1]. Finally, using two real-world data sets, the performance of the [0,1] TEE-BX distribution is explored. Based on the certain goodness of fit criteria, we conclude that the [0,1] TEE-BX distribution has a better fit than the other distributions.
Drought is one of the challenges Iraq faced during this period, and the negative environmental effects that are apparent due to climate change have become essential topics that attracted the attention of urban planners. As the lack of rain and high temperatures are among the reasons for the drought increase, especially in desert areas, the Babil governorate was chosen as one of the governorates that suffered from agricultural drought. Agricultural drought indices were analyzed and monitored by downloading satellite images from the United States website for the period 1995-2021, where the area of the Babylon governorate was 5119 . It was used to calculate agricultural drought for 1999-2015-2021; climatic elements data (temperature a
... Show MoreIn this paper, we conduct an investigation into a novel subclass of bi-univalent functions within the unit disk. The introduced subclass incorporates the generalized Srivastava-Attiya operator and satisfies specific quasi-subordination conditions. Through this study, the researchers determine the coefficient estimates and for functions within these subclasses and unveil new results by applying the operator to this particular subclass. The implications of these findings extend to complex analysis, number theory, and other branches of mathematics. Overall, this research significantly contributes to the theory of quasi-subordination of bi-univalent functions and enhances the understanding of the diverse applications of the Generalized S
... Show MoreGenetic and epigenetic factors affect chronic myeloid leukemia (CML) treatment response. The aim of the present study was to investigate the association of two TET2single nucleotide polymorphisms (SNPs) (rs34402524 and rs2454206) with CML incidence and response to imatinib mesylate (IM) treatment. Blood samples were collected from fifty CML patients (25 responders and 25 non-responders) and 50 healthy controls.Genotyping of TET2 gene rs34402524and rs2454206 was done by qualitative real-time PCR-based genotyping methods. The results of the present study revealed a significant increasein risk association of TET2 rs34402524 and rs2454206 heterozygous genotypes (TG) and (AG) with CML inci
... Show More