Isolation of fungi was performed from February to July, 2019. One hundred clinical specimens were collected from King Abdullah Hospital (KAH) Bisha, Saudi Arabia. Samples were collected from twenty patients of different ages (30 - 70 years old) ten males and ten females. The samples were collected from patients with the two types of diabetics. Specimens included blood, hair, nail, oral swabs and skin. Specimens were inoculated on Sabourauds Dextrose agar containing chloramphenicol. Thirteen fungal species were isolated and identified. The isolated species were: Aspergillus flavus, A. niger, A. terrus, A. nidulans, A. fumigatus, Candida albicans, C. krusei, C. parapsilosis, C. Tropicalis, Curvularia lunata, Fusarium solani, Penicillium marneffei and Saccharomyces cerevisiae. Identification of molds was carried out morphologically and microscopically using available methods and books of identification, while identification of yeasts was carried out using API system. C. albicans recorded the highest isolated number where 31 colonies were isolated from 18 patients, representing relative density of 22.5%. (R. D.: is the number of a certain fungal species divided by the total number of fungi). Other isolated fungal species recorded relative density less than 16 %. The most common isolated fungus Candida albicans was molecularly identified using the 5.8S and flanking ITS regions. The antifungal activity of some natural essential oils (cinnamon, thyme, coconut, almond and clove) was assayed against isolated fungi using disk diffusion method. The used concentration was 5 µl / plate. The MIC values were also determined using different oil concentrations (1, 2.5, 5, 10, 20 and 40 µl / disc).
Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThis research aims to evaluate the teaching methods used by intermediate Arabic language teachers. To achieve the goal, the researcher followed the descriptive-analytical approach. The research sample was limited to Arabic language teachers at intermediate school for the academic year (2017-2018) the researcher chose a random sample included (155) teachers which form a (40%) Of the original community at Baghdad/ Rusafa1th. The researcher has developed standards of teaching methods which are (7) standards with (39) paragraphs included three alternatives. The results showed the need to pay attention to the use of various modern teaching methods. Moreover, the researcher suggested making an evaluation of the teaching methods used by Arabic
... Show MoreSimulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode
This study is the first and new record to the spider Scytodes univittata Simon, 1882 (Araneae:Scytodidae)in Baghdad /Iraq , the spiders Scytodes univittata were collect from province Baghdad in Iraq , genus Scytodes belong to the family Scytodidae it is one of the most family are wide distribution around the world have 6 eyes and are slow moving , the genus Scytodes are known from the names spitting spiders ,.Female Scytodes univittata can be characteristic by :large round cephalothorax length:4.45 mm , abdomen length 3.50, total body length 7.95 mm and V-shaped of fovea, scutela triangle and large with long thin legs femur I have two row of spines then spineless are in IV femur , coloration is yello
... Show MoreIn this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreThis research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
The research topic (The dramatic structure transformations in the Iraqi Feature Film) studies the dramatic structure and its transformations in the Iraqi feature film. The research determined the research problem and the need for it in addition to the aims and the limits of the study as well as its importance. The theoretical framework consists of the following themes: the dramatic transformations mechanism and dramatic data in the Iraq film 1957-2003 then the dramatic values transformations and the performance contradictions in the Iraqi film.
The research, after concluding the theoretical framework, came up with a number of indicators of the theoretical framework that have been used as a tool to analyze the sample. The research proc
Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreSince the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.