Objective: To evaluate two kinds of extraction (aqueous and ethanolic) for coriander using seeds, leaves and stems and
studying their antibacterial activity against nine different microorganisms.
Methodology: Coriander was selected to carry out this study. Seeds, leaves and stems were collected from local markets in
Baghdad then dried in shade for at least 10 days and grinded to fine powder. Aqueous hot extracts for 1hr. at (50
c) and
cold extracts for 24 hrs at (4
c) were performed by using seeds, leaves and stems then studied antibacterial effect against
nine different microorganisms by using well diffusion technique. Cold aqueous extracts of coriander seeds for 48 hrs. and
72 hrs and ethanolic extraction for 48hrs of seed, leaves and stems also performed.
Results: This study showed that hot aqueous extracts for 1hr. to all parts of coriander indicated no antibacterial activity,
while cold aqueous extract for 24hrs of coriander seeds had inhibitory effect for some tested bacteria, but leaves and stems
had not. Cold aqueous extract of seeds for 48hrs showed antibacterial activity for all tested bacteria but in 72hrs there was
no inhibitory effect. On the other hand, ethanolic extracts of seeds, leaves and stems for 48hrs had antibacterial activity and
the highest values for inhibition zone shown in Klebsiella pneumoniae and Proteus mirabilis.
Recommendations: The study recommends using coriander seeds extract as alternative medical therapy for
microorganisms which may resist conventional treatment. This study is a first step for further studies. It is necessary to use
various extraction methods to give active materials with high percentage, although different organic solvents to be used
with coriander plant to obtain extracts used for testing different kinds of microorganisms which have highly resistance to
conventional treatment.
This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreGeneral Background: Deep image matting is a fundamental task in computer vision, enabling precise foreground extraction from complex backgrounds, with applications in augmented reality, computer graphics, and video processing. Specific Background: Despite advancements in deep learning-based methods, preserving fine details such as hair and transparency remains a challenge. Knowledge Gap: Existing approaches struggle with accuracy and efficiency, necessitating novel techniques to enhance matting precision. Aims: This study integrates deep learning with fusion techniques to improve alpha matte estimation, proposing a lightweight U-Net model incorporating color-space fusion and preprocessing. Results: Experiments using the AdobeComposition-1k
... Show MoreUse of computer simulation to quantify the effectiveness of blowing agents can be an effective tool for optimizing formulations and for the adopting of new blowing agents. This paper focuses on a mass balance on blowing agent during foaming including the quantification of the amount that stays in the resin, the amount that ends up in the foam cells, and the pressure of the blowing agent in the foam cells. Experimental data is presented both in the sense of developing the simulation capabilities and the validating of simulation results.
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire