134 samples of plants and animals wastes were taken from three different regions outside Baghdad and three different regions in Baghdad. 24 cellulolytic isolates fungi AO, C1, TH1, AN1, R1, TV, PG, AF, B1, L1, AP, TH, AP1, AN3, AO2, A, A1, C, F, AO1, C2, F1, CL and AP2 independent were chosen out of 48 selected fungi. The best optimal conditions for growth were 30ºC and pH 7. The isolates were identified and screened according to the colony diameter, biomass and density of spores in addition of capability to produce the hydrolytic enzymes for cellulose.
The study was carried out to detection of H.pylori in (200) patients who attended two teaching hospitals in Baghdad. The diagnosis done by Immunochromatography methods. Stools and blood samples was taken from each patient as well as other (30) healthy control matching in their age. The study included detection the Levels of Interleukin-40 and CRP in sera of patients and control. The result indicated presence of H pylori antigen in 115 cases 59 cases of males and 51 of females, Also, the result indicated increasing levels of IL-40, cholesterol, Triglycerides, Low density lipoprotein, Very Low density lipoprotein increased significantly while the level of High density lipoprotein decreased in patients sera in comparison with healthy c
... Show MoreIn this work, pure and doped Vanadium Pentoxide (V2O5) thin films with different concentration of TiO2 (0, 0.1, 0.3, 0.5) wt were obtained using Pulse laser deposition technique on amorphous glass substrate with thickness of (250)nm. The morphological, UV-Visible and Fourier Transform Infrared Spectroscopy (FT-IR) were studied. TiO2 doping into V2O5 matrix revealed an interesting morphological change from an array of high density pure V2O5 nanorods (~140 nm) to granular structure in TiO2-doped V2O5 thin film .Transform Infrared Spectro
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreThis research aims to know the essence of the correlative relationship between tactical thinking and solving mathematical problems. The researchers followed the descriptive research method to analyze relations, as all students from the mathematics department in the morning study were part of the research group. The research sample of (100) male and female students has been chosen based on the arbitrators' views. The tools for studying the sample of research composed of (12) items of the multiple-choice test in its final form to measure tactical thinking and require establish-ing a test of (6) test-type paragraphs to solve mathematical problems. The findings showed that sample students' tactical thinking and their capacity to overcome mathem
... Show More