Arsenic is a prevalent and pervasive environmental contaminant with varied amounts in drinking water. Arsenic exposure causes cancer, cardiovascular, liver, nerve, and ophthalmic diseases. The current study aimed to find the best conditions for eliminating arsenic from simulated wastewater and their effect on biomarkers of hepatic in mice. Adsorption tests including pH, contact duration, Al-kheriat dosage, and arsenic concentrations were evaluated. Seventy-two healthy albino mice (male) were accidentally allocated into nine groups (n = 8), the first group was considered as healthy control, the second group (AL-Kheriat), and other groups received AL-Kheriat and arsenic 25, 50, 75, 100, 125, 150 and 175 mg/kg, respectively. Next 10 days, the following were examined: LD50 level, ALP (alkaline phosphatase), ALT (alanine aminotransferase), and AST (aspartate aminotransferase), besides the histological condition of the liver. The results showed that the best time for arsenic removal was 4 hours, pH 8, Al- kheriat dose 1 gram, and 50 ppm of pollutants. The level of alkaline phosphatase ALP, alanine transaminase ALT, and aspartate transaminase AST was increased to 150.96 (U/L), 143.1(U/L), and 32.8(U/L), respectively, in Al-Khriet and arsenic exposed population than the healthy control group, When the appropriate dose of Al-Khriet and arsenic mixture is used, it can aid in the selection of a safe way of disposing of the adsorbed residue. Additionally, it can serve as a low-cost rodent pesticide, increasing the commercial viability of this removal strategy.
This study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe
The need for cloud services has been raised globally to provide a platform for healthcare providers to efficiently manage their citizens’ health records and thus provide treatment remotely. In Iraq, the healthcare records of public hospitals are increasing progressively with poor digital management. While recent works indicate cloud computing as a platform for all sectors globally, a lack of empirical evidence demands a comprehensive investigation to identify the significant factors that influence the utilization of cloud health computing. Here we provide a cost-effective, modular, and computationally efficient model of utilizing cloud computing based on the organization theory and the theory of reasoned action perspectives. A tot
... Show MoreField experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Resu
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented.
These species were recorded previously in the ornithological literatures by several authors and deposited in the
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreFlow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More