This study was conducted at the College of Education for Pure Sciences (Ibn Al-Haitham), University of Baghdad. The aim of this study was to isolate and diagnose fungi from fish feedstuff samples, and also detection of aflatoxin B1 and ochratoxin A in fish muscles and feedstuffs. Randomly, the samples were collected from some fish farms from Baghdad, Babil, Wasit, Anbar, and Salah al-Din provinces. This study included the collection of 35 feedstuff samples and 70 fish muscle samples, and each of the two fish samples fed on one sample of the feedstuff. The results showed the presence of several genera of different fungi including Aspergillus spp, Mucor spp., Penicillium spp., Yeast spp., Fusarium spp., Rhizopus spp., Scopiolariopsis spp., Epicoccum spp., Alternaria spp., Cladosporium spp., Botrytis spp., Helminthosporium spp. and Trichtheicum spp. Aspergillus spp. was the most present in all feedstuff samples by 48%, while the results of the detection of aflatoxin B1 showed contamination in 53 samples of the total 70 samples of fish muscles, while the contamination was found in 34 samples of fish feedstuff from a total of 35 samples. The concentrations ranged from 0-310 ppb in muscles and ranged from 0-864 ppb feedstuffs. Results of the detection of ochratoxin a revealed that 17 of the fish muscle samples were contaminated with the toxin of the total 70 samples and contamination of 13 feedstuff samples of the total 35 feedstuff samples. The concentration of ochratoxin A ranged from 0-98 ppb in fish muscles, while in feedstuffs it ranged from 0-573 ppb.
Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreIn this work, of New Ligand [(E)-5-hydroxy-4-(3-(4-methoxy phenyl) acryl amido) naphthalene -1- sulfonic acid] (ANS) was prepared by reflexing reaction of 4-amino-5-hydroxy naphthalene sulfonic acid with para methoxy cinnamic acid, this produced and described chemical was employed as ligand to prepare tri and di-organotin complexes by condensation reaction with the salts of organotin chloride (phenyl, butyl, and methyl tin chloride). Specialized methods, including elemental analysis, (tin and proton) magnetic resonance, and infrared spectra, were used to identify the complexes. DPPH (2,2-diphenyl-1-picrylhydrazyl) and CUPRAC (Cupric Reducing Antioxidant Capacity) are both commonly used methods for measuring antioxidant capacity in v
... Show MoreASTRACT
The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos
... Show MoreThis paper present a study about effect of the random phase and expansion of the scale sampling factors to improve the monochrome image hologram and compared it with previous produced others. Matlab software is used to synthesize and reconstruction hologram.