Background: Suppression of quorum sensing (QS) that regulates many virulence factors, including antimicrobial resistance, in bacteria may subject the pathogenic microbes to the harmful consequences of the antibiotics, increasing their susceptibility to such drugs. Aim: The current study aimed to make an aqueous crude extract from the soil Proteus mirabilis isolate with the use of the gas chromatography-mass spectrometry (GC-MS) technique for its analysis, and then, study the impact of the extract on clinical isolates of Pseudomonas aeruginosa. Methods: Preparation of crude extracts from P. mirabilis (both organic and aqueous), which were then analyzed by GC-MS to detect the bioactive ingredients. Furthermore, the extract’s capability to i
... Show MoreMB Mahmood, BN Dhannoon
In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThis research presents and discuss the results of experimental investigation carried out on geogrids model to study the behavior of geogrid in the loose sandy soil. The effect of location eccentricity, depth of first layer of reinforcement, vertical spacing, number and type of reinforcement layers have been investigated. The results indicated that the percentage of bearing improvement a bout (22 %) at number of reinforced layers N=1 and about (47.5%) at number of reinforced layers N=2 for different Eccentricity values when depth ratio and vertical spacing between layers are (0.5B and 0.75B) respectively
The numerical analysis was conducted to studying the influence of length to diameter ratio (L/D) on the behavior of the soil treated with sand columns treated with 8% sodium silicate for both floating and end bearing type by using finite element method (Plaxis 3D Foundation ) for isolated foundation of real dimensions. The analysis’s study indicate that in the floating type the best improvement ratio was achieved at (L/D=8) when using columns with a diameter of (0.5, 0.7), but when using columns with a diameter of 0.3 m, it was noticed that the bearing improvement ratio increases with increasing (L/d). While the results of the analysis for end bearing type show that the higher improvement ratio was achieved at (L/D=4) when using columns w
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreA paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreThis research presents a statistical study of radiation generated from communication towers in the Nineveh Plain region Baghdeda. The intensity of radiation energy was measured at 10 meters away from the communication tower in different locations, using a (1PC XH-901 Dosimeter/ Personal Dose Alarm / Radiation Detector, dosage rate: 0.01 μSv/h to 150μSv/h) to measure the amount of radiation at various times. Energy densities were measured and compared with standard limits provided by other authorities, such as the International Committee for Radiation Protection. Results were analyzed using SPSS version 26 to implement the data. The results show that the means of the radiation levels measured at all the zones do not statistically differ
... Show More