Mercury, arsenic, cadmium and lead, were measured in sediment samples of river and marine environmental of Basra governorate in southern of Iraq. Sixteen sites of sediment were selected and distributed along Shatt Al-Arab River and the Iraqi marine environment. The samples were distributed among one station on Euphrates River before its confluence with Tigris River and Shatt Al-Arab formation, seven stations along Shatt Al-Arab River and eight stations were selected from the Iraqi marine region. All samples were collected from surface sediment in low tide time. ICP technique was used for the determination of mercury and arsenic for all samples, while cadmium and lead were measured for the same samples by using Atomic Absorption Spectroscopy. The results for all the measurements in Shatt Al-Arab sediment showed the values at extent: (0.0611-0.1233 µg/g), (0.5490-46.2052µg/g), (2.3356-4.7773 µg/g), (51.3309-107.0358 µg/g) for concentration of mercury, arsenic, cadmium and lead respectively.While the concentrations in marine sediment were recorded at range: arsenic (0.3510 - 46.0110 µg/g), cadmium (3.5136 - 5.5905 µg/g) and lead (43.68974-75.37045µg/g). The statistical analysis for all stations was studied by using the software SPSS v-20.0. It shows there are no significant differences in the concentrations between stations at P≥0.05 level and also the geo accumulation index was calculated for metals in all stations.
A retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco
... Show MoreThis paper proposed a new method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA)) for measureing the closeness between curves. Root Mean Square Errors is used for the implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when the cov
... Show MoreA sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source with C.F.I.A.. The method was based on the formation of ion pair for the pinkish banana color precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D%
... Show MoreThis article discusses the estimation methods for parameters of a generalized inverted exponential distribution with different estimation methods by using Progressive type-I interval censored data. In addition to conventional maximum likelihood estimation, the mid-point method, probability plot method and method of moments are suggested for parameter estimation. To get maximum likelihood estimates, we utilize the Newton-Raphson, expectation -maximization and stochastic expectation-maximization methods. Furthermore, the approximate confidence intervals for the parameters are obtained via the inverse of the observed information matrix. The Monte Carlo simulations are used to introduce numerical comparisons of the proposed estimators. In ad
... Show MoreThis work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreThe extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.
In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.
In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show MorePhotonic crystal fiber interferometers are used in many sensing applications. In this work, an in-reflection photonic crystal fiber (PCF) based on Mach-Zehnder (micro-holes collapsing) (MZ) interferometer, which exhibits high sensitivity to different volatile organic compounds (VOCs), without the needing of any permeable material. The interferometer is robust, compact, and consists of a stub photonic crystal fiber of large-mode area, photonic crystal fiber spliced to standard single mode fiber (SMF) (corning-28), this splicing occurs with optimized splice loss 0.19 dB In the splice regions the voids of the holey fiber are completely collapsed, which allows the excitation and recombination of core and cladding modes. The device reflection
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show More