Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
Solar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so
... Show MoreBackground: To evaluate the ISO depth of cure of bulkfill composites and depth of cure which determined by Vickers microhardness test. Materials and Methods: Bulkfill resin composite specimens (n=150) were prepared of three bulkfill composite materials (TetricEvo Ceram, Quixfil and SDR) and light cured by Flash max p3 for 3, 10, 20 seconds and by wood pecker for 10, 20 seconds respectively, a mold was filled with one of the three bulkfill composites and light cured. The specimens removed from the mold and scraped by plastic spatula and the remaining length (absolute length) was measured which represent the ISO depth of cure. After that the specimens were returned into the mold and a microhardness indentation device applied on the specimen
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThin films of bulk heterojunction blend Ni-Phthalocyanine
Tetrasulfonic acid tetrasodium salt and dpoly
(3, 4-ethylenedioxythiophene) poly (styrenesulfonate) (NiPcTs:
PEDOT: PSS) with different (PEDOT:PSS) concentrations (0.5, 1, 2)
are prepared using spin coating technique with thickness 100 nm on
glass and Si substrate. The X-Ray diffraction pattern of NiPcTs
powder was studied and compared with NiPc powder, the pattern
showed that the structure is a polycrystalline with monoclinic phase.
XRD analysis of as-deposited (NiPcTs/PEDOT:PSS) thin films
blends in dicated that the film appeared at(100), (102) in
concentrations (0.5, 1) and (100) in concentration (2). The grain size
is increased with increasing