This work concerns the synthesis of two types of composites based on antimony oxide named (Sb2O3):(WO3, In2O3). Thin films were fabricated using pulsed laser deposition. The compositional analysis was explored using Fourier transform infrared spectrum (FTIR), which confirms the existence of antimony, tungsten, and indium oxides in the prepared samples. The hall effect measurement showed that antimony oxide nanostructure thin films are p-type and gradually converted to n-type by the addition of tungsten oxide, while they are converted almost instantly to n-type by the addition of indium oxide. Different heterojunction solar cells were prepared from (Sb2O3:WO
... Show MoreThe topic of the partnership between the public and private sectors with great interest by researchers around the world after making sure that the process of economic and social development depends on a combination of resources and energies and expertise of both the public and private sectors in the creation and operation of the various projects , the economic development of the growing proved the failure of both sectors in achieving greater economic growth Klaaly separately in many countries , especially developing countries with a socialist approach , led one way or another to adopt most of the countries economic reform programs promoted by international organizations and institutions ( such as the IMF and the World Bank ) of i
... Show MoreUrban land uses are in a dynamic state that varies over time, the city of Karbala in Iraq has experienced functional changes over the past 100 years, as the city is characterized by the presence of significant tourist and socio-economic activity represented by religious tourism, and it occur due to various reasons such as urbanization. The purpose of this study is to apply a Markov model to analyze and predict the behavior of transforming the use of land in Karbala city over time. This can include the conversion of agricultural land, or other areas into residential, commercial, industrial land uses. The process of urbanization is typically driven by population growth, economic development, based on a set of probabilities and transitions bet
... Show MoreBackground: Complement (C) & CRP in patients with Rheumatoid arthritis (RA)'could be trigger disease activity.
Aim: To study the correlation between C, CRP, IgM,, IgG, IgA & some clinical presentation in RA patients.
Methods: Latex agglutination test(AG) & single radial immunoassay(SRIA) were used to asses CRP, IgMJgGJgA,, C, in 74 patients with RA.
Results: IgA & IgG were significantly increased, while the mean ofC3, C4 were slightly elevated in RA patients .
Conclusion: There is correlation between IgG and IgM with joint deformity and joint swelling respectively, while C3 was showed statistically significant P<0.01 with joint
stiffness, joint swelling and Rheumatoid nodule, whe
AbstractBackgroundLeishmaniasis is endemic in Iraq, where both cutaneous and visceral forms of the disease are reported.ObjectivesTo determine the prevalence of cutaneous leishmaniasis (CL) and to identify associations of CL with age, sex, season, and provinces depending on some demographic and climatic aspects.MethodsThis study is retrospective and includes reported cases of infections using the available surveillance database taken from the Iraqi Ministry of Health for the years 2011, 2012, and 2013 for all provinces of Iraq.ResultsMen and boys were found to be at higher risk for CL compared with women and girls. The majority of cases were recorded among those in age groups 5–14 and 15–45 years old. Most cases were recorded from lowla
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show More