This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This method has an average recovery percentage by 104%. This result was also supported by the precision, linearity, LOD and LOQ, i.e. 0.0775; 0.968; 0.00000256 and 0.000000775, respectively.
Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and bot
... Show MoreThis research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi
The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo
... Show MoreBackground: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.
Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.
Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe present study is concerned with studying the effect of aquatic plant Hydrella vorticellata with the concentration of 10 and 20 gm/2 K gm soil on percentage and growth rate of germinating seeds of Hordeum vulgare and Vicia faba. More overs, the quantitative amount of NPK in both tested plants and Hydrella vorticellata, are estimated as an organic fertilizer. It has also been find the total number of root cells, the number of dividing cells, and stages of mitosis. The study reveales, that there are no significant differences between the concentration of hydrella used in germination percentage, growth rate, wet and dry weight. While there are differences in the plants containing NPK. The number of cells dividing stages and number of divid
... Show Moreأجري البحث لمعرفة الملوثات الميكروبية الموجودة على قشرة وفي صفار وبياض بيض الدجاج المحلي ، السوري ، التركي ، الاوكراني ، حيث جمعت العينات بمعدل 10 بيضة من الاسواق الشعبية في محافظة بغداد . أظهرت النتائج أن بكتريا السالمونيلا واضحة في صفار البيض التركي . وفي قشرة وبياض وصفار البيض الاوكراني . كما أظهرت نتائج فحص البيض