In this review, numerous analytical methods to distinguish pigments in tattoo, paint, and ink items are discussed. The selection of a method was dependent upon the purpose, e.g., quantification or identification of pigments. The introductory part of this review focuses on describing the importance of setting up a pigment-associated safety profile. The formation of different degradation chemical substances as well as impurity trends can be indicated through the chemical investigation of pigments in tattoo products. It is noteworthy that pigment recognition in tattoo inks can work as a preliminary method to identify the pigments in a patient's tattoo before being removed by laser therapy. Contrary to the study of banned pigments, the identification process usually requires only a few indication substances for positive dyes. In general, tattoo pigments are almost insoluble in aqueous solutions, and many organic solvents and various pigment analyses have been conducted. It is proposed that in the future, laboratories concerned with tattoo substance analysis should have access to extensive pigment specifications and spectroscopic databases. The most important and recent physiological side effects of tattooing have been discussed in this review.
The logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreThe reaction of starting materials (L-asCl2):bis[O,O-2,3;O,O-5,6-(chloro(carboxylic) methylidene)]- -L-ascorbic acid] with glycine gives new product bis[O,O-2,3,O,O-5,6-(N,O-di carboxylic methylidene N-glycine)-L-ascorbic acid] (L-as-gly) which is isolated and characterized by, Mass spectrum UV-visible and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the (L-as-gly) with M+2; Co(II) Ni(II) Cu(II) and Zn(II) has been characterized by FT- IR , Uv-Visible , electrical conductivity, magnetic susceptibility methods and atomic absorption and molar ratio . The analysis showed that the ligand coordinate with metal ions through mono dentate carboxylic resulting in six-coordinated with Co(II) Ni(II) Cu(II) ions while with
... Show MoreBasketball is a popular game in many parts of the world and many developed countries are making continuous efforts to prepare and develop their emerging players on scientific and clear bases as the basis for reaching high levels The researchers used the descriptive approach in the method of correlative studies to suit the nature of the study The readymade software (IBM SPSS Statistics Version24) was used to perform statistical treatments The researchers concluded that there was a significant relationship between body size indicators (height and weight) with the fitness elements of the emerging basketball players The researchers recommended conducting a similar study to determine the type of relationship to the indicators of the physical str
... Show MorePseudomonas aeruginosa gram-negative, bacilli and facultative aerobic, P. aeruginosa cause cystic fibrosis patients, wounds, burns, and immunodeficienct patients, that have many virulence factors such as pyocyanin , cytotoxic ,biofilm formation and motility, Eighty-eight isolates belonging to P. aeruginosa were collected including the 66 clinical isolates obtained from different hospitals in Baghdad and were from different sources and 22 environmental isolates from previous studies of soil near oil fields. Microscopical and cultural characteristics were studied and diagnosed using biochemical tests, VITEC device, their ability to adhere to non-living (Polystyrene), living cell line (A549) and cytotoxicity of bacterial filtrate
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:
1- Increasing the level of availability of study variables inside the companies “The study sample”.
2- There is a correlation between the independent v
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show More