To study and understand the mechanism of living systems, and how it works, it is quite important to investigate it at molecular level (like genomic, proteomic) as well as the methodologies, and how to apply and imply it on different branch of sciences and how can use it in developing medical diagnosis, treatments, drugs, and increased it in the future. Additionally it can also be applied in forensic techniques, food production and agriculture, as well as genetic profiling. This can be well understand by interfering and combinations of all branches of life sciences such as chemistry, physics, biotechnology, genetic evolution, and minimize the gap between them, this
... Show MoreThis study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreThis paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show MoreThe aim: In this study, we present and evaluate the vest-over-pants technique as a simple way to correct urethrocutaneous fistulas after hypospadias. Materials and methods: Between October 2018 and June 2020, twenty male patients aged 5 to 20 years came to us with post hypospadias repair fistula, these patients underwent vest-over-pant repair of their fistula. The size of fistula was ranging between 2.5-5 mm. The distribution of fistula was coronal (3 patients), distal penile (9 patients), midshaft (2 patients) and proximal penile (6 patients). In 14 patients there were single fistula and 6 patients had more than one fistula. Eleven of patients were exposed to a previous failed fistula repair procedure. Results: Six months after the operati
... Show MoreAbstract
The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreMandali Basin is located between latitudes (33◦ 39' 00" and 33◦
54' 55") to the north and longitudes (45ο 11' 00" and 45ο 40' 00") to the
east; to the east of Diyala province at the Iraqi-Iranian border; the
basin area is approximately 491 km2.
From the study of climate reality of the basin between 1990-
2013and assessment of the basic climate transactions, it was found
that the annual rate of rainfall is 253.02 mm, the relative humidity
(44.4%), the temperature (21.3 ◦C), wind speed (2.08 m /sec.),
sunshine (8.27 h/day) and evaporation of the basin class (a) (271.98
mm) and corrected potential evapotranspiration (80.03 mm). The
results of the data analysis show that, there are
The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show More