The study included identification of Leishmania parasites from cases of cutaneous leishmaniasis, by examination of smears for LD bodies , isolation of parasites by culture in media , and characterisation of the isolated parasites by Isoenzyme analysis.Out of 100 cases suspected for cutaneous leishmaniasis ; 85 were diagnosed on culture for Leishmania promastigotes and this method was found to be superior to direct microscopy for amastgotes (LD bodies) .The cases included in this study belonged to different areas of Wasit/Iraq. There were 30 cases from Hay, 35 from Badra, and 35 cases from Suwaira.The distribution of infection in different age groups indi
... Show MoreMaterials with external dimensions of one or more nanometers are referred to as nanomaterials. These structures result from a number of manufacturing processes. They are used in many industries, including pharmaceuticals, which is the most significant one. Numerous variables, including size, shape, surface morphology, crystallinity, solubility, etc., affect physical properties. While new physical and chemical processes are being created constantly, the biological method is the ideal strategy for synthesizing nanoparticles since it is straightforward, safe, and economical. Different kinds of nanoparticles can be metabolically synthesized by a wide variety of biological sources, including plants, bacteria, fungi, and yeast. There are
... Show MoreEnvironmental controls, especially for temperature and humidity, are essential to maintain the safety, purity and effectiveness of drugs. The measurement of humidity can be particularly difficult and important in climatic and thermostatic chambers (warehouses, ovens, cold rooms, fridges, drying rooms, insulated boxes, etc.).
The old method of monitoring and qualification of climatic and thermostatic chambers requires placing a defined number of recorders, then programming and store them. After that, to examine the values recorded to revolve the status of the climatic and thermostatic chambers, if they are compliant or not-complaint at any time, so all that goes to waste time and efficiency of values.
We can do the monitoring and qu
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreEffective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul
This paper provides a four-stage Trigonometrically Fitted Improved Runge-Kutta (TFIRK4) method of four orders to solve oscillatory problems, which contains an oscillatory character in the solutions. Compared to the traditional Runge-Kutta method, the Improved Runge-Kutta (IRK) method is a natural two-step method requiring fewer steps. The suggested method extends the fourth-order Improved Runge-Kutta (IRK4) method with trigonometric calculations. This approach is intended to integrate problems with particular initial value problems (IVPs) using the set functions and for trigonometrically fitted. To improve the method's accuracy, the problem primary frequency is used. The novel method is more accurate than the conventional Runge-Ku
... Show MoreThere are great figures in our nation, who are famous for their encyclopedia in their sciences, and their fame spreads across the horizons for what they presented to their religion and nation.
So they became torches of guidance, advocates of goodness, and treasuries of knowledge until God inherits the earth and those on it.
Among these imams is Imam al-Qurtubi, who died in the year (671 AH), after whom he left a great legacy of valuable books, including this one, which is the subject of my research, his valuable interpretation (Al-Jami’ Li Ahkam Al-Qur’an). Taking from him and his approach in interpreting the verses of judgment, following the method of extrapolation, investigation and deduction to know his style, which he used
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
the contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show More