Toxoplasma gondii has a worldwide distribution and it is one of the most prevalent infectious agents in Iraq. The study was conducted on 200 serum samples of unmarried female university of students age ranged between 18 to 26 years to detect Toxoplasma gondii antibodies. The aim of this study was to detect T. gondii antibodies among unmarried female students in Iraqi universities using different serological tests. Seventy six (38%) serum samples out of 200 subjects were positive for toxoplasma antibodies by Latex agglutination test (LAT). Among 76 LAT sera positive ,only 58 (29%) serum samples were positive with toxoplasma IgG ELISA test , however , the results of IgM ELISA assay were positive only for 3 (1.5%) unmarried female sample .None of negative LAT serum samples gave positive results with neither IgG nor IgM ELISA.
The corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range ( 303 –343 )K, at pH ( 4 ) and at pH (4,6,7,9,11 ) at (343K)..The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature, the corrosion current density (icorr) decreased with increasing pH in the rang ( 4 – 7 ) and it increased with increasing pH in the rang ( 9 – 11 ) at ( 343 K ), while the corrosion potential generally variation with increasing pH in the rang (4-11)at(343K. From the general results for this study can be seen that thermodynamic and kinetic function were
... Show MoreTwelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreThis research aims to study the optical characteristics of semiconductor quantum dots (QDs) composed of CdTe and CdTe/CdSe core-shell structures. It utilizes the refluxed method to synthesize these nanoscale particles and aims to comprehend the growth process by monitoring their optical properties over varied periods of time and pH 12. Specifically, the optical evolution of these QDs is evaluated using photoluminescence (PL) and ultraviolet (UV) spectroscopy. For CdTe QDs, a consistent absorbance and peak intensity increase were observed across the spectrum over time. Conversely, CdTe/CdSe QDs displayed distinctive absorbance and peak intensity variations. These disparities might stem from irregularities in forming selenium (Se) layers a
... Show MoreThe current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod
... Show Morehe aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More