The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant
... Show MoreAbstract: Colloidal gold nanoparticles (ringworm Palm or in the form of paper willow) have been prepared from HAuCl4 containing aqueous solution by hot chemical reduction method. The colloidal gold nanoparticles were characterized by SEM, EDX, and UV-VIS absorption spectroscopy. It was found that the variation of reduction time from boiling point affects the size of the nanoparticles and also in chemical reduction approach the size of nanoparticles can be controlled by varying the amount of variation the volume of reductant material with respect to the volume of HAuCL4.
The orogenic gold deposit of Tamilouw – Haya is hosted by slate and metapelitic rocks within Tehoru metamorphic complex. Gold and polymetallic sulfides mineralization at study area is predominantly formed in the form of veins, stockwork and breccia although minor dissemination is slightly appeared in the rock float samples. They are trapped and controlled by NE-SW and NNE-SSW trending geologic structure occurred during orogeny process from Late Miocene to Pliocene. The common ore minerals assemblage at Tamilouw – Haya deposit are dominated by native gold, chalcopyrite, pyrite, sphalerite, galena, pyrrhotite, tetrahedrite-tennantite (sulphosalt), marcasite,realgar, kalininite and arsenopyrite as hypogene minerals and accompanied by co
... Show MoreMetallic nanoparticles are increasingly studied for their biomedical applications due to their unique physicochemical and catalytic properties. Here, a broccoli-mediated gold/platinum nanohybrid (Au@Pt NH) was synthesized using an ultrasound-assisted green method with an aqueous extract of Brassica oleracea var. italica for multifunctional biomedical evaluation. XRD and TEM confirmed a crystalline nanohybrid with an average crystallite size of 7.56 nm and a mean particle diameter of 13.08 ± 7.58 nm. The broccoli extract produced no inhibition zones, whereas Au@Pt NH inhibited Staphylococcus aureus (18 mm), Staphylococcus epidermidis (21 mm), Escherichia coli (18 mm), Klebsiella pneumoniae (20 mm), and Candida albicans (21 mm). In vivo,
... Show MoreGas adsorption phenomenon on solid surface has been used as a mean in separation and purification of gas mixture depending on the difference in tendencies of each component in the gas mixture to be adsorbed on the solid surface according to its behaviour. This work concerns to study the possibilities to separate the gas mixture using adsorption-desorption phenomenon on activated carbon. The experimental results exhibit good separation factor at temperature of -40 .
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreIn this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables