Microbial antibiotics resistance is considered a serious health issue in the Middle East and developing countries. In this study, the Fe2O3 nanoparticles was prepared chemically, and the particles size and shape were analyzed by using Scan electron microscope (SEM) and X-Ray diffraction (XRD). Different concentration of Fe2O3 nanoparticles were used and examined on E.coli and S. aureus. Using liquid dilution and in vitro cytotoxicity assay by microplate toxicity test (MTT). The microbial cell metabolic activity was measured on gram-negative, gram-positive bacteria and fungi after treating with different concentrations of Fe2O3 nanoparticl
... Show MoreThe effect of mixed corrosion inhibitors in cooling system was evaluated by using carbon steel specimens and weight loss analysis. The carbon steel specimens immersed in mixture of sodium phosphate (Na2 HPO4) used as corrosion inhibitor and sodium glocunate (C6 H11 NaO7) as a scale dispersant at different concentrations (20,40, 60, 80 ppm) and at different temperature (25,50,75 and 100)ºC for (1-5) days. The corrosion inhibitors efficiency was calculated by using uninhibited and inhibited water to give 98.1%. The result of these investigations indicate that the corrosion rate decreases with the increase the corrosion inhibitors concentration at 80 ppm and at 100ºC for 5 days, (i.e,
... Show MoreThe aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods
used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146) sheets only were considered in the study. SPSS program was used
... Show MoreBackground: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.
Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system. to determine the doctors in the hospital's commitment to referral system instructions and guidelines.
Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More