The study was carried out in order to evaluate clinically and laboratory cachectic animals suffering from anemia. Animal examined were 50 cow and calf. The study include clinical, hemato and biochemical test for accurate diagnosis of cachexia in cows and calves . Blood smears were conducted for detection of blood parasites , fecal examination for gastrointestinal parasites and Different parameters were applied for classification of cachexia , depending on bony projection specially ribs and pelvic and generalized muscular atrophy. However , The study revealed an incidence of cachexia and anemia of blood parasites was including Theileria, Anaplasma, gastrointestinal parasites, ten cases were shown foreign body syndrome while other tens were diagnosed as other clinical cases. A significant decrease ( P < 0.05) of RBCS, Hb, PCV and WBC count in debility animals were observed . However , a significant lymphocytosis were seen in blood parasites infection and other clinical cases , Neutrophilia in foreign body syndrome and other clinical cases , Esenophilia in gastrointestinal parasites infestation ,Monocytosis in all clinical cases were detected . Different parameters were applied for classification of anemia mainly morphological classification including macrocytic hypochromic anemia mainly recorded in blood parasites infection and other clinical cases while Normocytic hypochromic anemia appeared in gastrointestinal parasites infestation, and foreign body Syndrome.Fecal examination of cachectic animal indicate the identification of (7) species of gastrointestinal parasites including: Cooperia onchophora, Haemonchus contortus, Bunostomum phlebtomum, Ostertagia spp., Oesophagostomum radiatum, Trichostrongylus axei and Strongyloides papillosus. However , a mixed infestation parasite was dominant and recorded in Animal.Biochemical changes revealed a. Hypoprotenemia appears in all cachectic animal except in foreign body syndrome cases .
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreIn this paper, the characteristics of microstrip monopole antennas are studied firstly in free space. Secondly, the effects of the human body on the studied antenna's performance are investigated for wearable communications. Different patch shapes of microstrip monopole antenna are chosen to operate at two bands: industrial scientific and medical band (ISM) and ultra-wideband (UWB) for wearable applications. The studied antenna consists of a radiating element on one side of the substrate and a partial ground plane on the other side. The antenna is supposed to fabricate on cloth fabric whose relative dielectric constant is Ɛr =1.7. At the same time, the pure copper could be used as the conducting part representing both t
... Show MoreContinuous escalation of the cost of generating energy is preceded by the fact of scary depletion of the energy reserve of the fossil fuels and pollution of the environment as developed and developing countries burn these fuels. To meet the challenge of the impending energy crisis, renewable energy has been growing rapidly in the last decade. Among the renewable energy sources, solar energy is the most extensively available energy, has the least effect on the environment, and is very efficient in terms of energy conversion. Thus, solar energy has become one of the preferred sources of renewable energy. Flat-plate solar collectors are one of the extensively-used and well-known types of solar collectors. However, the effectiveness of the coll
... Show MoreThe presented research investigated the pollen morphology of endemic Iraqi Hypericum species. The study revealed phenotypic features of pollen grains in the polar and equatorial views and their quantitative and qualitative characteristics. The results showed that the pollen grains of the genus Hypericum were radially symmetrical and isopolar, and their apertures were simple and tricolporate, except the species H. davisii, distinguished as tetracolprate. Dividing the studied species based on pollen grain sizes comprised two groups. Small pollen grains with an average length of the equatorial view ranged between 10–16 μm in H. lysimachioides and H. vermiculare. Medium-sized pollen grains with an average extent between 17–26 μm e
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreA simple, accurate and sensitive spectrophotometric method for the determinaion of epinephrine is described . The method is based on the coordination of Pr (III) with epinephrine at pH 6. Absorbance of the resulting orange yellow complex is measured at 482 nm . A graph of absorbance versus concentrations shows that beer 's low is obeyed over the concentration range (1-50)mg.ml-1 of epinephrine with molar absorpitivity of ( 2.180x103 L.mol-1.cm-1 ), a sandell sensitivity of (0.084 mg.cm-2 ), a relative error of (-2.83%) , a corrolation coffecient (r= 0.9989) and recovery % ( 97.03 ± 0.75 ) depending on the concentration.This method is applied to analyse EP in several commercially available pharmaceutical preparations
... Show MoreCarbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were