The chemical, physical and toxicological effects on health of synthetic dyes that used as tracking dye in the electrophoresis requires seriously search about alternative tracking dye. The present study is aimed to find an alternative dye from safe food dyes which commonly used in food coloring. Five dyes were selected depending on their chemical properties and the availability in local market: Brilliant Blue FCF, Tartrazine, Sunset Yellow FCF, Carmoisine, and green traditional, three dyes were chosen to be mixed as loading buffer: Brilliant Blue FCF, Sunset Yellow FCF as a basic because it give the whole range size of most traditional loading buffers that available in market, and adding the Carmoisine as a new indicator for the bands less than 50bp, then mixed with DNA ladder in same percentage used with traditional loading buffers to clarify the effects of dyes on DNA, migrated on 1% agarose with loading buffer promega, results showed more clarity and highly readable separation of dyes and give wide range of size in the food loading mix than promega loading dye, by viewing the gel on UV light the DNA ladder were moved smoothly, bands separated effeminately on gel and in same rate of the DNA ladder that load with promega loading buffer which indicate no interaction between the food dyes and the DNA.Our studies show that the food dye can be used as a tracking dye in place of used synthetic dye. The procedure is found to be easy, practical, safely and reliable.
This study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions
Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show MoreAbstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance
Non-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp
... Show MoreLet R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.
Banks was one of the institutions that are highly concerned with the issue of performance evaluation, in order to achieve optimal use of resources that enable them to achieve operational and strategic objectives both in light of the global competition fierce for the start of the research problem of banks to adopt in assessing the performance of the realization of just the traditional financial indicators which has become insufficient to keep pace with the constant evolution in the business environment, which requires work on the use of the necessary information needed to evaluate the performance of all the Bank's activities through
the use of the Balanced Scorecard method. The research aims to shed light on the dimensions of perf
... Show MoreHTH Ali Tarik Abdulwahid , Ahmed Dheyaa Al-Obaidi , Mustafa Najah Al-Obaidi, eNeurologicalSci, 2023
In this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.