Background: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten volunteers participated in the present study. Nutrient broth tubes have been prepared for MIC test, where various concentrations of the Gotu Kola extracts (0.5mg/ml, 1 mg/ml, 2 mg/ml, 3 mg/ml, 4 mg/ml, and 5 mg/ml) were added, respectively. The tubes incubated at 370C for 48h. Results:The MIC test shows that a concentration of 4 mg/ml have the ability to inhibit the growth of oral Lactobacilli and 8 mg/ml has the ability to inhibit the growth of S. aureuswhich may be due to asiaticoside and asiatic acid which are active ingredients that the leaves extracts consists of. There was no MIC for Streptococci. Conclusion:The Gotu Kola leaves extract can be used to inhibit the growth of some oral microorganisms at certain concentration. Keywords:Centella asiatica, oral microorganisms, antimicrobial activity, minimum inhibitory concentration.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreBackground: Health education was put as one of the components of primary health care elements and was recognized as a fundamental tool to the attainment of health for all
Objective: To evaluate the Knowledge, attitude regarding health education & to find out if there is any association between the gathered data and certain variables (age, gender, educational level, occupation). Methods: A Cross-sectional study done at Al Mustansyryia Primary Health Care Center from the 1st of January to 1st of May 2016. All patients attending the Primary Health Care Centers who were above 18 years of age and willing to participate in the research (303) were included in t
... Show MoreSilver sulfide and the thin films Ag2Se0.8Te0.2 and Ag2Se0.8S0.2 created by the thermal evaporation process on glass with a thickness of 350 nm were examined for their structural and optical properties. These films were made at a temperature of 300 K. According to the X-ray diffraction investigation, the films are polycrystalline and have an initial orthorhombic phase. Using X-ray diffraction research, the crystallization orientations of Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2 (23.304, 49.91) were discovered (XRD). As (Ag2Se and Ag2Se0.8Te0.2 & Ag2Se0.8S0.2) absorption coefficient fell from (470-774) nm, the optical band gap increased (2.15 & 2 & 2.25eV). For instance, the characteristics of thin films made of Ag2Se0.8Te0.2 and Ag2Se0.8S0.2
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreYeasts are distributed in all environments and have been reported as potential biocontrol agents against various phytopathogenic fungi. To investigate their enzymatic and biological activities, 32 yeasts were isolated from 15 date vinegar samples. Evaluation of the antagonistic activities of isolated yeasts against the plant pathogens Fusarium oxysporium, Sclerotinia sclerotiorum, and Macrophomina phaseolina indicated that there are two yeasts had the highest inhibitory effect against plant pathogens, these yeasts identified as Kluyveromyces marxianus and Torulaspora delbrueckii using traditional and molecular methods. These yeast isolates were tested for fungal cell wall degrading enzymes (in vitro), and results indicated that the
... Show MoreThis study aims to fabricate and assess the β-tricalcium phosphate (β-TCP) bioactive ceramic coat layer on bioinert ceramic zirconia implants through the direct laser melting technique by applying a long-pulsed Nd:YAG laser of 1064 nm. Surface morphologies, adherence, and structural change in the coatings were evaluated by optical microscopy, field emission scanning electron microscope, hardness, and x-ray diffractometer. The elastic modulus (EM) of the coating was also determined using the nanoindentation test. The quality of the coating was improved when the laser power was 90 W with a decrease in the scan speed to 4 mm s−1. The chemical composition of the coat was maintained after laser processing; also, the Energy Dispersive
... Show More
