The objective of this study is to evaluate the bacterial count and heavy metal concentration of river water on fish micronuclei. Fish and water samples are carried out in 1 May to 1 June 2013 from Tigris River. A total of fifty three fish sample are studied. The bacteriological quality of water showed that the total viable count is ranged from 150×103 to 352×103 cfu/ml and fecal coliform counts was 1250 cell/100ml during the study period. All the metals (Cu, Hg, Pb, and Zn) are within the normal limit, but Cd was slightly elevated in river water samples. The appearance of micronuclei in red blood cells of all fish species is detect , by recording a larger number of it, in ( Abu Alsomere , Hishne , Bannini Kaber al fam & Karkoor ahmar) species compared with (Abu AL hakam , Nabbash , Kattan , Himri & Tela shami ) species. There is a difference in the percentages of the leukocytes types in different fish species, the highest percentage (12.3) of lymphocyte is recorded in Barbus xanthopterus and the lowest (1.5) is in Garra rufa
This research contributes to environmental sustainability by recycling natural waste resources in making clothing products. The research aims to employ palm trees waste in designing belts suitable for contemporary women's fashion trends. Both descriptive and applied research approaches were used. Therefore, a collection of belts was designed and implemented. Then, a questionnaire was used to assess the extent to which the implemented belts achieved in sustainability standards using Likert scale. The sample size was 60 women. The data were analyzed using the SPSS program to calculate the arithmetic mean and standard deviation. One of the significant results of the research is the high average scores of the criteria for achieving sustainab
... Show MoreBackground: The recognized procedures that have been used to treat gynecomastia are said to have relatively a long operative time, less patient satisfaction rate, they are merely used, in mild to moderate gynecomastia, leaves a mild bulging over the nipple areola complex, resulting in aesthetically unsatisfactory results. The more the grade of gynecomastia, the more complicated the used surgical techniques. This study evaluates the success rate of these simplest surgical technique in higher grades of gynecomastia.
Objectives: to present the experiences with use of Modification of Combined Vibrated Power Assisted Liposuction with Periareolar Gland Excision in management of in
... Show MoreThe research aims at the scholars’attention to the importance and role of Arab Muslim women through books and historical studies that historians and scholars have taken up like Ibn Al-Jawzi (597 AH) and his book Safwat Al-Safwa, where he presented the conduct of worship and their words and deeds, and explained to women worshipers other aspects of their lives, such as the scientific aspect Crafts and works as well as their prominent role in preaching and religious guidance, and the impact of this on their morals and qualities. This study showed the strength of the personality of women and their high interest in worship. The importance of the study lies in knowledge.The research followed the role of Muslim women to carry t
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreGlutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee
... Show More