A study was carried out to determine the concentrations of trace metals in vegetables and fruits, which are locally available in the markets of Baghdad-samples of fourteen varieties of vegetables and fruits, belonging to Beta vulgaris, Brassica rapa, Daucus carota, Allium cepa, Eurica sativa, Malva silvestris, Coriandrum Sativum, Trigonella Foenum craecum, Anethum graveolens, Barassica oleracea, Phaseolus vulgaris, citrus reticulata, Py rus malus, and Punica granatum. Analysis for Cd,Pb, Mn, Fe, Co, Ni, Cu and Zn were determined by flame atomic absorption sp ectrophotometry. The results indicated that the Malva silvestris recorded the highest concentrations of Cd and Mn while Allium cepa showed the highest concentrations of Pb and Cu. But Eurica sativa, Anethum graveolens, phaseolus vulgaris and Daucus carota were observed the highest values of Fe, Co, Ni and Zn respectively. It can be noticed that the zinc has the highest values while the nickel recorded the lowest values in all studied samples.
A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show More
There is a theoretical controversy in the books of Usul al-Fiqh, in the past and the present, about whether the ruling should be attached to its reason (al-Hikmah), or its apparent and stable cause (al-Illah). Looking at the practical cases of the jurists, we found them sometimes attaching rulings to its reason, and sometimes to its cause, so there is a need to know the factors that affect their choices. By extrapolation, the researcher reached at nine factors that affect referring the ruling to its cause or to its reason in jurisprudential cases.
The human gastrointestinal system is a complex ecosystem crucial for well-being. During sepsis-induced gut injury, the integrity of the intestinal barrier can be compromised. Lipopolysaccharide (LPS), an endotoxin from Gram-negative bacteria, disrupts the intestinal barrier, contributing to inflammation and various dysfunctions. The current study explores the protective effects of limonene, a natural compound with diverse biological properties, against LPS-induced jejunal injury in mice. Oral administration of limonene at dosages of 100 and 200 mg/kg was used in the LPS mouse model. The Murine Sepsis Score (MSS) was utilized to evaluate the severity of sepsis, while serum levels of urea and creatinine served as indicators of renal f
... Show MoreA paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreIn this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-
... Show MoreEnglish is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show MoreKE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3
Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More