Land snails constitute an important group of mollusks distributed worldwide. This study reports on land snails found in Iraq. A survey of terrestrial gastropods was performed during their activity seasons in gardens, agricultural lands and nurseries in Iraq from March 2022 to September 2023. Fifteen terrestrial snails belonging to seven families were documented. The species Euchondrus michonii (Bourguignat, 1853) was identified and recorded based on several distinct conchological characters for the first time in Iraq. The recently collected specimens, along with those previously recorded in Iraq, were included in this checklist. Essential information on each species is also presented. As there is no previous checklist or study that
... Show MoreThe air flow pattern in a co-current pilot plant spray dryer fitted with a rotary disk atomizer was determined experimentally and modelled numerically using Computational Fluid Dynamics (CFD) (ANSYS Fluent ) software. The CFD simulation used a three dimensions system, Reynolds-Average Navier-Stokes equations (RANS), closed via the RNG k −ε turbulence model. Measurements were carried out at a rotation of the atomizer (3000 rpm) and when there is no rotation using a drying air at 25 oC and air velocity at the inlet of 5 m/s without swirl. The air flow pattern was predicted experimentally using cotton tufts and digital anemometer. The CFD simulation predicted a downward central flowing air core surrounded by a slow
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThis study was conducted at the Poultry Research Station of the Agricultural Research Department/Ministry of Agriculture in Abu Ghraib for the period from 25/2/2019 to 7/4/2019 (42 days) with the aim of using several levels of Spirulina (SP)
The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreBackground: This study was aimed to investigate the effect of three lingual button (Nickel free / rectangular base, Nickel free / round base and Composite) and bonding environment, wet and dry enamel surface, on: the shear bond strength (SBS) of light and self-cured Resin Modified Glass Ionomer Cements, and the debonding failure sites. Materials and method: One hundred twenty no-carious, free of cracks maxillary first premolar teeth were selected. Three types of orthodontic lingual buttons were used in this study: Nickel free / rectangular base, Nickel free / round base and Composite buttons. The teeth were divided into two groups of sixty teeth each. One group was used for testing the chemically cured GC Fuji Ortho Resin modified Glass Io
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More