Preferred Language
Articles
/
jbcd-1104
An In Vitro Evaluation of the Effectiveness of Gotu Kola (Centella asiatica) on Inhibiting the Growth of Selected Microorganismsin Human Saliva
...Show More Authors

Background: Gotu Kola (Centella asiatica) has been used as a traditional medicine for many years to cure different kinds of diseases. Studies have been reported that Gotu Kola extracts might be used as a cure for oral diseases such as periodontal disease. In the present study, Gotu Kola leaves extracted with water will be used to evaluate its effect on some microorganisms living in the human saliva using minimum inhibitory concentration (MIC) method. Material and Method:Gotu Kola fresh leaves extract have been used with water as a solvent, a rotary evaporator was used to separate the solvent from the extract. The following microorganisms: Streptococci, Lactobacilli, and Staphylococcus aureus have been isolated fromthe Saliva of ten volunteers participated in the present study. Nutrient broth tubes have been prepared for MIC test, where various concentrations of the Gotu Kola extracts (0.5mg/ml, 1 mg/ml, 2 mg/ml, 3 mg/ml, 4 mg/ml, and 5 mg/ml) were added, respectively. The tubes incubated at 370C for 48h. Results:The MIC test shows that a concentration of 4 mg/ml have the ability to inhibit the growth of oral Lactobacilli and 8 mg/ml has the ability to inhibit the growth of S. aureuswhich may be due to asiaticoside and asiatic acid which are active ingredients that the leaves extracts consists of. There was no MIC for Streptococci. Conclusion:The Gotu Kola leaves extract can be used to inhibit the growth of some oral microorganisms at certain concentration. Keywords:Centella asiatica, oral microorganisms, antimicrobial activity, minimum inhibitory concentration.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
8th International Conference On Agricultural, Environment, Biology And Medical Sciences
Description new species from leafhopper belongs to genus Neoalitarus Distant, 1918 in Iraq
...Show More Authors

Publication Date
Thu Nov 17 2022
Journal Name
مجلة الدراسات الدولية
Iraq's strategic performance in achieving sustainable development after 2005: challenges and coping strategies
...Show More Authors

The research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.

View Publication
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Conversion Rate from Laparoscopic to open Cholecystectomy in AL-kindy Teaching Hospital, Baghdad
...Show More Authors

Background: laparoscopic cholecystectomy (LC) is getting popularity for the treating of symptomatic gall bladder disease; conversion from laparoscopic to open cholecystectomy (OC) is also common.

Objective : To find out the prevalence of causes, risk factors of conversion from LC to OC among  patient suffering from gall bladder disease, and  to explore the most common causes of conversion from laparoscopic to open cholecystectomy.

Methods: This prospective study was conducted in the department of general surgery at Alkindy teaching hospital from first of January 2016 to the end of December 2017 .Nine hundred twenty patient were included. Patient age, gender, his

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Coronary Angiographic Findings in Diabetic Patients Versus non-Diabetics with Coronary Heart Disease
...Show More Authors

Background :Atherosclerosis is the most
frequent underlying cause of ischemic heart
disease and a major cause of death all over the
world. This study was carried out to analyze and
compare the angiographic findings in patients
with diabetes mellitus versus non diabetics with
coronary heart disease , and to correlate these
findings with some risk factors for coronary
heart disease.
Methods: A total of 100 patients were studied,
50 with diabetes mellitus, and 50 non diabetics.
This study was carried out at Al-Sadr teaching
hospital in Basrah, Southern Iraq during the
period April 2009- September 2009. All patients
were known to have coronary heart disease. Risk
factors for coronary heart disease

... Show More
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Ironic Metonymy in Russian and Arabic : Ироническая метонимия в русском и арабском языках
...Show More Authors

This article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and irony

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Al-academy
Develop design interior spaces for children's theater halls in Baghdad: إخلاص عبد سلمان
...Show More Authors

The research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater

... Show More
View Publication Preview PDF
Crossref