In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesium (Mg), calcium (Ca), chlorine (Cl), phosphate (PO4) and nitrate (NO3) were detected and analyzed. The grid soil samples on the site and surrounding areas have been investigated, analyzed, and compared to the background points. The storage area grid was divided into 30 major sectors and all samples were evaluated from acquires 10 samples from each sector. The detection results have indicated that SO4 level was exceeded the permitted level by 25 times, K level also exceeded the permitted level but by 460, Na ions were 85 times greater the permitted level. Mg level was 180 times higher than that of permitted content. Activity level of Ca in the soil samples of the study area has also exhibited variability with nine times over the permitted level near the bunkers. However, very high contamination spot activity of Cl was found in destruction zone about which 44 times over the background level was found while PO4 level exceeded the permitted level by 35 times over the permitted level and there was no activity detected for the nitrate in the storage area site.
This paper analyzes the effect of scaling-up model and acceleration history on seismic response of closed-ended pipe pile using a finite element modeling approach and the findings of 1 g shaking table tests of a pile embedded in dry and saturated soils. A number of scaling laws were used to create the numerical modeling according to the data obtained from 1 g shake table tests performed in the laboratory. The current study found that the behaviors of the scaled models, in general have similar trends. From numerical modeling on both the dry and saturated sands, the normalized lateral displacement, bending moment, and vertical displacement of piles with scale factors of 2 and 35 are less than those of the pile with a scale factor of 1 and the
... Show MoreFor the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreEchocardiography is a widely used imaging technique to examine various cardiac functions, especially to detect the left ventricular wall motion abnormality. Unfortunately the quality of echocardiograph images and complexities of underlying motion captured, makes it difficult for an in-experienced physicians/ radiologist to describe the motion abnormalities in a crisp way, leading to possible errors in diagnosis. In this study, we present a method to analyze left ventricular wall motion, by using optical flow to estimate velocities of the left ventricular wall segments and find relation between these segments motion. The proposed method will be able to present real clinical help to verify the left ventricular wall motion diagnosis.
Clinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b
Detection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show More The present study is an attempt for detection of A. baumannii by conventional and PCR methods using species-specific primers for these A. baumannii. A total of 87 samples were collected from hospitals in Baghdad (Al-Rasafa and Al-Karkh Hospitals) during the period from 2019 to 2020.The samples included: 40 specimens, from wounds, respiratory infections (sputum), burns, CSF and 47 samples from the hospital environment (swabs), while samples collected from intensive care unit including patient beds, surgical instruments and appliances, emergency lobby and baby incubators. A. baumannii isolate identification depending on the morphologic characteristics on the culture media including, blood agar, MacConkey agar, as well as t
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More