Fungi produce a series of toxic compounds on corn, especially Fumonisin B1 (FB1) toxin produced by Fusarium spp. and promoting cancer activity in humans and animals. This study aimed to the isolation and identification of fungi associated with local corn seeds and the detection for the presence of FB1 by using ELISA technique. Thirty samples of corn ears were collected from silos and markets in Baghdad city during the period from November 2018 to March 2019. The present study found that Fusarium was the dominant isolate among fungi in terms of the relative density 57.07%, followed by Aspergillus 31.17%, Rhizopus 3.36%, Alternaria 2.88%, Mucor 2.16%, Penicillium 1.92%, Trichothecium 0.96%, and Helminthosporium 0.48%. FB1 was detected in all samples of the silos and markets with a concentration range of 13.69 - 175.54 µg/kg. There were no significant differences in FB1concentration among samples collected from the silos and markets. Also, no relationship was found between the number of infected seeds by Fusarium spp. and FB1concentrations.
Purpose: Studying the activity of acid phosphatase, which is the marker of lysosomal activity in the mammary glands of rats at different stages of the physiological maturation [virgih, pregnancy, lactation and Post lactation] Methods: Forty, female, albino rats were used in this study. They were divided into four groups according to their physiological states [virgin, pregnancy, lactation and post lactation]. The mammary glands, after suitable fixation and sectioning, were employed for routine haematoxylin and eosin stain and for acid phosphatase demonstration Results: Acid phosphatase activity was weakly diffuse in the secretory tubules of virgin rats, the diffuse and granular activity of this enzyme was increased during pregnancy in the s
... Show MoreThe aim of this investigation is to study the rote of alkaline phosphatase in mammogenesis and lactogenesis. A total of fortyfemalealbino rats were used and divided according to their physiological states into four groups [ten rats each]. From each deeply ether anesthetized rat, the mammary gland was removed, fixed, quenched in liquid nitrogen and sectioned using SLEE cryostat. The sections were employed for routine haematoxylin and eosin stain and alkaline phosphatase demonstration using the calcium–cobalt method. The obvious finding in the mammary glands of pregnant rat was the presence of thick black rings indicating strong alkaline phosphatase activityaround the basal part of the secretory epithelium of the alveoli. In lactating mamma
... Show MoreThe aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as
... Show MoreThe cellular and molecular toxicity effect of Aloe Vera crude extract on meristem cells of onion (Allium cepa) roots were studied . Different concentrations of this crude extract 20% ,10% ,5% ,2% ( and 40%) were used at different periods ; 24 ,48 and 72 hour . Number of chromosomal aberrations and the mitotic index was calculated . In addition, the genetic effects were observed by using randomly amplified polymorphic DNA ( RAPD ) technique . The results showed that the gel crud extract of Aloe vera had inhibition effects on the growth of the onion roots with 10% EC50 value. Significant effects of this gel crud extract were also observed on the chromosomal a
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreLandsat-5 Thematic Mapper (TM) has been imaging the Earth since March 1984 and Landsat-7 Enhanced Thematic Mapper Plus (ETM+) was added to the series of Landsat instruments in April 1999. In this paper the two sensors are used to monitoring the agriculture condition and detection the changing in the area of plant covers, the stability and calibration of the ETM+ has been monitored extensively since launch although it is not monitored for many years, TM now has a similar system in place to monitor stability and calibration. By referring to statistical values for the classification process, the results indicated that the state of vegetation in 1990 was in the proportion of 42.8%, while this percentage rose to 52.5% for the same study area in
... Show MoreThe importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply, It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .
Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of
... Show More