Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and
... Show MoreBackground: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
Background: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show MoreAbstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show MoreIn this investigation, water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals), utilizing N-acetyl cysteine as a stabilizer, were prepared to assess their potential in differentiating between DNA extracted from pathogenic bacteria (e.g. Escherichia coli isolated from urine specimen) and intact DNA (extracted from blood of healthy individuals) for biomedical sensing prospective. Following the optical characterization of the synthesized QDs, the XRD analysis illustrated the construction of NAC-CdTe-QDs with a grain size of 7.1 nm. The prepared NAC-CdTe-QDs exhibited higher PL emission features at of 550 nm and UV-Vis absorption peak at 300 nm. Additionally, the energy gap quantified via PL and UV–Vis were 2.2 eV
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show More