This paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
Objective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 pat
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThis study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra
In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the ban
... Show MoreThis study aims to create spatial balance between two Iraqi writers' novels (Maysaloon
Hadi, Alya Talib) technical and objective illustrates similarity points and difference in the
writers' style. We depended in our research on spatial classification considering the aggressive
and friendly, since the writers focused on them.
The research study concluded to many sides, some of which are similar and some are
different. Firstly, ingenuity description of the writers. Followed by the deep connection they
have. Because of the personal experience it emanated from alienation sensations and nostalgia
to deep roots to homeland.
On the other hand, difference aspects, we see Maysaloon takes symbols and illusions
unlike Aly
Oil well drilling fluid rheology, lubricity, swelling, and fluid loss control are all critical factors to take into account before beginning the hole's construction. Drilling fluids can be made smoother, more cost-effective, and more efficient by investigating and evaluating the effects of various nanoparticles including aluminum oxide (Al2O3) and iron oxide (Fe2O3) on their performance. A drilling fluid's performance can be assessed by comparing its baseline characteristics to those of nanoparticle (NPs) enhanced fluids. It was found that the drilling mud contained NPs in concentrations of 0,0.25, 0. 5, 0.75 and 1 g. According to the results, when drilling fluid was used without NPs, the coeff
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.
We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to
... Show MoreThe demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB
... Show More