Background Several studies have addressed the prevalence of Toxoplasma gondii (T. gondii), among Parkinson’s disease (PD) patients in different countries, and the potential association between the infection and PD; the results of these studies were conflicting. The study aims to investigate the prevalence of Toxoplasma infection among sample of Iraqi PD patients. Also, to examine the potential association of age, PD duration, gender, smoking habit, zone of residence and family history of PD, with the prevalence of Toxoplasma infection in PD patients.
Patients and Methods Seventy-four PD patients attaining Dr. Saad Al-Witry Neuroscience Hospital in Baghdad/ Ir
... Show MoreBackground: The aim of this study was to measure the radiopacity (RO) of modified microhybrid composite resins by adding 2 types of nanofillers (Zinc Oxide and Calcium Carbonate) in two concentrations 3% and 5% and comparing them to unmodified microhybrid composite resins and to nanofilled composite resin. Materials and Methods: Two types of composite resin were used (Microhybrid composite MH Quadrent anterior shine and Nanofilled composite resin Filtek Z350 XT), for each tested group five disk-shaped specimens (1-mm-thick and 15 mm diameter) were fabricated. The material samples were radiographed together with the aluminum step wedge. The density of the specimens was determined with a transmission densitometer and was expressed in term of
... Show MoreThe purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil
... Show MoreOptimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura
... Show MoreOptimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In order to study the effect of inoculation with mycorrhiza and fertilization with plant residues on the growth of plants, we used two factors: the first two levels of mycorrhiza inoculation, Glumus mossea (0 and 10 g.pot-1) and the second factor, four levels of plant residues (10 g.pot-1) celery plant residues, 10 g pot-1 mint residues, and 10 g pot-1 black bean seed residues. Mychorrizal treatment (10 g pot-1) increased the number of mycorrhiza spores and the infection percentage of mycorrhizal by 917.44% and 13088.23%, respectively; celery treatment (10 g.pot-1) increased the chlorophyll index in the leaves and height of the chard plant by 31.34% and 94.04%, respectively; and black seed treatment (10 g.pot-1) increased the percen
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show More