In this research calculate the ecliptic and equatorial coordinates for the Moon , Sun and Jupiter through 100 years and calculate the distances between the Moon and the Earth , the Sun and the Earth , Jupiter and the Sun, Jupiter and the Earth . From Calculation and discussion the changes in the equatorial coordinate were: Δ , Δ δJ = (22.73+21.93, 23.28+22.99) , and the maximum values and minimum values for the Moon were: Rm(min) = 0.00239,0.00240 and Rm(max) = 0.0027,0.00272 , and Jupiter RJ(min) = 4.99077,4.99966 and RJ(min) = 5.44469,5.45057 , and the periods change preface to calculate the conjunction of the Moon and Jupiter.
The current study was conducted on 504(Ros-308) broiler chicks reared in Animal farms belong to College of Agriculture, University of Baghdad during the period 28/9/2017- 9/11/2018 to determine the effect of ginseng additive on the performance of chicks. Results of study showed a significant effect (p≤0.05) of exposure period an Red blood cells, 3.56×106ml3 of blood was in bird, which exposure to 2hr at heat shock. In 42 day at age 106 ×38 ml3 of blood can noticed in the blood at birds, which exposure to 2hr in 21-42 days at 3 days of age. No significant effect at ginseng on blood cells. The results showed a significant effect (p≤0.05) of interaction on red blood cells at 21 and 42 days of age and the average cells between these ages
... Show MoreBackground: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses i
... Show MoreWellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It
... Show MoreDeriving land cover information from satellite data is one of the most common applications employed to monitor, evaluate, and manage the environment. This study aims to detect the land cover/land use changes and calculate the areas of different land cover types in Baghdad, Iraq, for the period from 2015 to 2020, using Landsat 8 images. The supervised Maximum Likelihood Classification (MLC) method was applied to classify the images. Four land cover types were obtained, namely urban, vegetation, water, and barren soil. Changes in the four land cover classes during the study period were observed. The extent of the urban, vegetation, and water areas was increased by about 7.5%, 9.5%, and 1.5%, respectively, whereas t
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAbstract As a part of our ongoing project on the design and synthesis of new 4-thiazolidinone derivatives with antimicrobial activity, four new 4-thiazolidinone derivatives carrying bromo, nitro, methyl, and chloro groups on the benzene ring were synthesized by starting with the 7-amino-4-methylcoumarin moiety, linking coumarin with various phenyl isothiocynate to form the thiourea group, and then cyclizing the derivatives, characterized by IR and 1HNMR, and assayed in vitro for their antimicrobial activity against Gram positive and Gram negative bacteria and fungi. Overall, 2-(4-methyl-2-oxo-2H-chromen-3-yl)-3-(4-nitrophenyl) thiazolidin-4-one to be the most powerful individuals in the series. Based on the observed data, it can be sta
... Show More