Reinforced concrete (RC) beams containing a longitudinal cavity have become an innovative development and advantage for economic purposes of light-weight members without largely affecting their resistance against the applied loads. This type of openings can also be used for maintenance purposes and usage space of communication lines, pipelines, etc. RC beams are primarily loaded in the plane of the members, which are two-dimensional in a plane stress state and the dominant structural behaviours include bending, shear, or combination of both. In the present study, six numerical models of RC beams with and without openings were simulated by using commercial finite element software ANSYS to evaluate the structural behaviours of those b
... Show MoreMicrobial lipases today occupy a place of prominence among biocatalysts owing to their ability to catalyze awide variety of reactions in aqueous and non- aqueous media, A.baumannii were isolated from different clinical specimens from hospitalized patients from Baghdad hospitals and were detected by biochemical tests and API20E system. The percentage of isolation was (16.6%), A. baumannii is an increasingly multidrug – resistant (MDR), it showed high level of resistant to Ceftriaxon, Colistin, Piperacillin, Co-trimoxazol, Tertracycline, Carbenicillin, Amoxicillin, Penicillin G, Gentamicin and Ceftazidim , wherease the isolates were highly sensitive to Imipenem, Ciprofloxacin, Meropenem, Amikacin, and Cefotaxime.
... Show MoreBackground: Insertion sequence is a short DNA sequence encode for proteins implicated in the transposition activity. Transposase catalyzes the enzymatic reaction allowing the insertion sequence to +9*lo2 move. ;qqa;.
Objective: To study the sequencing of transposase gene, tnp, IS1216V of S. aureus isolated from food and then compared with that documented in National Center for Biotechnology Information (NCBI).
Methods: Food samples of animal
... Show MoreColon cancer is an abnormal growth of cells that occurs in the large intestine. Sometimes growth remains restricted for a relatively long time before it becomes a malignant tumor and then spreads through the intestinal wall to the lymph nodes and other parts of the body. The study aims to estimate the effectiveness and partial purification of lipoxygenase (LOX) enzyme and measure gamma-glutamyle transferase (GGT) activity in serum patients of colon cancer in Baghdad. The study included (80) case male patients with colon cancer with (50) samples of apparently healthy males (control) as comparison group. The result displayed a noteworthy increase in lipoxygenase effectivene
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreDigital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.
First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .
&nbs
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More