Metal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.53 for Li, 860-14330 for Mg, 16.20-71.5 for Mn, 612-4725 for Na and 15.8-46 µg g-1 for Zn. The results revealed that the concentration of Al, B except in Syrian mesquite, Ba, Ca, Fe, K, Mg and Mn in all analysed vegetables is higher than the recommended value, Li is well-within the safe limit, and Co, Na except in dill, arugula and common purslane, Zn are lower than the recommended intake of these elements. From health point of view, the HQ values for Al, Fe (for all vegetables) and Ba (in dill, vine leaves, thymes, arugula, basil, common purslane and parsley) were higher than one, indicating potential non-cancer health risk due to exposure to these metals. Furthermore, the HI value for all vegetables was higher than one, indicating potential non-cancer health risk due to long-term exposure to these metals.
Pera Magroon anticline is located within the northeastern of Iraq, covering area estimated by 958 Km2. The Landsat ETM+ false color composite imagery was produced by assigning [741] bands. It is used to distinguish alluvial fans in the southwestern limb of Pera Magroon anticline. Digital elevation models (DEM) were used for describing topographic features related to the alluvial fans, as well as, three dominations model (3D) was created from (DEM) and the Landsat ETM+ image.
Arc GIS, hydro tool set was used to draw the drainage patterns, the area of study was covered by dendritic and parallel patterns. Contour lines across the fans form segments of ellipses reveal the pattern of tectonic act
... Show MoreFloods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.
The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreWireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show More