Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, antibiotics, antiretrovirals, and anticancer drugs. Additionally, this review demonstrated the use of analytical techniques to examine these contaminants in various kinds of River water. Due to their extremely low concentrations in the aqueous environment (about in the range of ng/L to g/L), it is necessary to apply a technique for highly sensitive and selective multicomponent simultaneous analysis to identify and quantify these products. This analytical technique provides a flexible and reliable means to identify and evaluate pharmaceutical contaminants in river water samples by combining solid phase extraction and hyphenated mass spectrometric techniques. SPE-LC/MS/MS is the main method for estimating the level of pollution.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreDepp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show MoreIn this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show MoreBackground: pregnancy as a systemic condition causes changes in the functioning of human body as a whole and specifically in the oral cavity and it also is considered as a stressful condition. These changes may favor the increase of oxidative stress. Aim: The aim of this study was to estimate the level of marker of oxidative stress (malondialdehyde) and antioxidant (uric acid) in saliva of pregnant compared to non-pregnant women and to assess the gingival health condition in both groups. Additionally, unstimulated salivary flow rate was determined in both groups. Subjects, materials and methods: The study group consisted of sixty pregnant women, they were divided into three equal groups according to trimester (20 pregnant women for each
... Show More
The aim of the present research is to study different protein fractions in sera of children and adolescent with β –thalassemia major and minor and to compare the results with that of healthy control.One hundred fifty children and adolescents were enrolled in this study,including 50 patients with β- thalassemia major , 50 patients with β- thalassemia minor as pathological control group and another apparently 50 healthy individuals as a control group. The age of all studied groups ranged from (4-18)years.Total protein, albumin and immunoglobulins were estimated in sera of all subjects. A Significant decrease was found in the total protein and albumin&nb
... Show MoreAlthough the axial aptitude and pile load transfer under static loading have been extensively documented, the dynamic axial reaction, on the other hand, requires further investigation. During a seismic event, the pile load applied may increase, while the soil load carrying capacity may decrease due to the shaking, resulting in additional settlement. The researchers concentrated their efforts on determining the cause of extensive damage to the piles after the seismic event. Such failures were linked to discontinuities in the subsoil due to abrupt differences in soil stiffness, and so actions were called kinematic impact of the earthquake on piles depending on the outcomes of laboratory
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.