act : A soluble cytoplasmic antigen (Brucellin) was prepared from Brucella melitensis Rev1 and used to diagnose brucellosis in experimentally infected mice with virulent strains of Brucella melitensis and Brucella abortus two weeks after infection. The best result was obtained with the third peak of the four peaks. All four peaks were used as antigen for skin test in a group of mice two weeks after vaccinated with S19 vaccine and the best result was obtained with third peak. All four peaks were also used as antigen for skin test in a group of mice previously vaccinated with Listeria monocytogenes live attenuated vaccine. All four fractions of the extracted brucellin antigens exhibited a negative skin test result in Listeria monocytogenes ex
... Show MoreProtease enzyme production was studied and optimized as a first step to collect information about solid state fermenter) to produce protease enzyme. A local isolated Aspergillus niger was used for this study with constant spores feeding in every experiment at (105/g). Experiments carried out in conical flasks with (250 ml) containing (10 g) of wheat straw as a substrate with different conditions included temperature, pH, hydration ratio, and fermentation time, the results comprised by measuring protease activity (u). The results showed that the best activity can be obtained at (T = 32°C, t= 100 hrs, pH= 2.5 and hydration ratio is 1:3). On the other hand the results is courage to p
... Show MoreIn this work, production of silicon metal at high purity of 99% by using Iraqi–starting materials (Iraqi sand and plant coal)was reported, electric arc–furnaces assembly was manufactured inside, the graphite electrodes were made from graphite scrap, this system is operate to produce about 800 gm /6hr of silicon metal to meet the need for manufacturing silicon oils, resins, solar cells, and electronic parts. The procedure, equipments and analysis data were described as well.
Background: The COVID-19 pandemic has an immense effect not only on the social and economic lives of people but also on the surgical lives of surgeons, residents, nursing staff, and patients as well as ground level staff. Amidst this COVID pandemic, emergency surgeries were being done but at a decreased rate, whereas elective cases depended on the will of hospitals, surgeons, and patients. Study aims to promulgate a "Neo–Surgical Check Box" by amalgamating the WHO surgical checklist and the results obtained from the questionnaires.
Subjects and Methods: After receiving ethical clearance from the Institute Ethical Committee, an online questionnaire with 50 questions divided into
... Show MoreNanocrystalline TiO 2 and CuO doped TiO 2 thin films were successfully deposited on suitably cleaned glass substrate at constant room temperature and different concentrations of CuO (0.05,0.1,0.15,0.2) wt% using pulse laser deposition(PLD) technique at a constant deposition parameter such as : (pulse Nd:YAG laser with λ=1064 nm, constant energy 800 mJ, with repetition rate 6 Hz and No. of pulse (500). The films were annealed at different annealing temperatures 423K and 523 K. The effect of annealing on the morphological and electrical properties was studied. Surface morphology of the thin films has been studied by using atomic force microscopes which showed that the films have good crystalline and homogeneous surface. The Root M
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More
