Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
In order to have an idea about what happens in Iraqi food establishments in relation to implement quality management system ISO 9001, this study was performed to show the actual situation of Iraqi food establishments concerning quality management system (ISO 9001:2015), reasons of implementing, factors that hinder implementing and problems faced high administration for getting establishments certification ISO 9001:2015. The study demonstrated from the questionnaire some difficulties to implement ISO 9001 for both of establishments that implemented the quality system or which in implementing of this international standard. The most important problems during implementing were business culture and costs and the most important proble
... Show MoreThe research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.
Variation order plays an important role in calculating the final cost and time. The paper aims to determine the causes of variation orders in projects performed between 2007-2014 in Erbil governorate projects. Data was collected from contract documents. Performed in the Erbil governorate projects from 2007-2014. The study seeks to identify the most significant causes of delays by assessing the common causes of delays in terms of frequency, severity and
important indices of owners, consultants and contractors related to&n
... Show MoreEnglish
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show More|
The research problem lies in the lack of accurate scientific perceptions concerning the reality of the communicator and the factors influencing his job. The research is aimed at introducing the communicator in the university press, clarifying the obstacles facing him, and uncovering the level of his job satisfaction and his visions of developing his work. The researcher adopted the survey method in the collection, analysis, and interpretation of the data using a questionnaire. A set of results and conclusions has been reached, most importantly are:
*The communicator performs multiple missions including writing, editing, and collecting info |
This work focuses on the implementation of interfaces for human machine interaction (HMI) for control and monitor of automatic production line. The automatic production line which can performance feeding, transportation, sorting functions.
The objectives of this work are implemented two SCADA/HMI system using two different software. TIA portal software was used to build HMI, alarm, and trends in touch panel which are helped the operator to control and monitor the production line. LabVIEW software was used to build HMI and trends on the computer screen and was linked with Micros
... Show More