The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
This approach was developed to achieve an accurate, fast, economic and sensitivity to estimation of diphenhydramine Hydrochloride. The dye that produced via reaction between diphenhydramine HCl with thymol blue in acidic medium pH ≈ 4.0. The ion pair method include an optimization study to formed yellowcolored that extraction by liquid – liquid method. The product separated of complexes by using by chloroform solution measured spectrophotometry at 400 nm. The analysis data at optimum conditions showed that linearity concentration in a range of calibration curve 1.0 – 50 μg /mL, limit of detectionand limit of quantification 0.0786 and 0.2358 μg/mL respectively. The molar absorptivity and Sandell’s sensitivity were 1.8 × 10 -4 L/mo
... Show MoreThis study has been conducted to examin the effect of potassium sorbate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.03% potassium sorbate prolonged the storage peroid until the third month .three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli using 0.06% potassium sorbate showed no growth of bacteria up to six month of storage ,while using of 0.03% and 0.06% potassium sorbate prevent the growth of mold up to three and six months of storage respectively. Both Aspergillus and Penicillium were isolated from the processed biscuit.
In spite of increasing clinical cases which caused by enteroviruses transferred by water and no documents about entericviruses in the Iraqi water standards. The use of coliphages as an indicator of enteroviruses and fecal pollution were suggested two procedures were applied . The first is Two-Step Enrichment Method and the second is Single Agar Layer Method. Both methods gives good results in Identification of coliphages through testing fifty different water samples (Tap water, Surface water and Bottled water) the study shows the presence of coliphages in fourteen samples.
This paper presents L1-adaptive controller for controlling uncertain parameters and time-varying unknown parameters to control the position of a DC servomotor. For the purpose of comparison, the effectiveness of L1-adaptive controller for position control of studied servomotor has been examined and compared with another adaptive controller; Model Reference Adaptive Controller (MRAC). Robustness of both L1-adaptive controller and model reference adaptive controller to different input reference signals and different structures of uncertainty were studied. Three different types of input signals are taken into account; ramp, step and sinusoidal. The L1-adaptive controller ensured uniformly bounded
... Show MoreHydatidosis is a zoonotic, helminthes parasitic disease that cause veterinary and human problems due to economic burden. Amis of the current study was to estimate the prevalence rate of hydatidosis infecting different organs of sheep slaughtered in street. In addition, investigate the relationship between age, gender and the infected rates in some Baghdad areas during a period from may to end of July 2018.A total of 188 sheep was examined for detection of Hydatid cyst in different organs using macroscopic and microscopic examination The overall prevalence rate of 47.9% was recorded. The results indicate non significant differences according to age and gender, the highest rate 57% was observed in sheep more than one year old compare
... Show MoreBackground: Chronic kidney disease is a condition that results from an indefinite change in the structure and function of the kidneys. A slow, steady progression characterizes it and is irreversible. Objectives: This study aims to evaluate the findings of certain biochemical and hematological tests in samples from Iraqi CKD patients. Methods: This study included 90 subjects, where 70 patients with chronic kidney disease and 20 healthy individuals. Blood samples were collected from the patients during their visits to Ghazi Al-Hariri Surgical Specialties' Hospital- Medical City, Baghdad, Iraq. Age, sex and body mass index were assessed for each participant followed by renal function tests [serum blood urea, creatinine, uric acid a
... Show MoreObjective: Certain advantages of donkeys are still not listed as for other equine species. Moreover, donkeys lack comprehensive scientific studies. The present study examines the histological architecture and histochemical characteristics of the esophagus in the Iraqi local breed donkey (Equus asinus). Materials and Methods: Eight esophagus samples were collected from a local breed donkey. Tissue specimens (~1 cm³) were collected from the cervical, thoracic, and abdominal regions of the esoph¬agus and processed via routine histological technique. The tissue sections were stained with hema¬toxylin and eosin, Massons Trichrome, and combined Alcian blue (pH 2.5) plus PAS (AB-PAS). Results: The esophagus of the local breed donkey h
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More