This study was done to compare among 120 new and used cosmetic brands to determine the heavy metals concentrations (Cadmium, Chromium) in (face foundation, powder and blushers). Sixty new cosmetic products were bought from local markets in Baghdad city (twenty different brands foe each cosmetic products), while sixty used cosmetic products were collected from Iraqi women and they had been stored for a long time. This study proved that not all analyzed cosmetic products containing heavy metals concentrations and all concentrations are under Iraqi acceptable limits except one new blusher product which contained chromium with (28 ppm), but all used cosmetic products have shown better results in concentrations of heavy metals than new products and we found that foundations are the best from all analyzed products, although these have emulsion texture which is difficult to store and easily to contaminate; even though most of these cosmetic products have label of ingredients and brand, or free from production and expiration date, that will not prevent any presence of heavy metals within their chemical structure. Women must avoid using the same brand and store the products for a long period to prevent expose to the same chemical ingredients of these products because of being vulnerable to biodegradation and refraining to buy products without a certain brand or country origin.
Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th
... Show MoreThis study was designed to investigate the effect of different cadmium concentrations on albino mice males' oxidative balance through lipid profile, malondialdehyde (MDA) concentration and catalase (CAT) activity estimation in liver and kidney. Parsley Petroselinum crispum was chosen to detect its effect as a natural antioxidant.
Five groups of albino mice males (10 mice each) were treated with (0.0, 0.25, 0.5, 0.75 and 7.5) mg Cd/kg b.w. orally by using gavages needle for 60 days according to 5 days/week protocol, another five mice groups were treated with the same cadmium concentrations mentioned above and 0.1 ml of parsley Petroselinum crispum juice.
The results showed an adverse effect of cadmium on mice oxidative balance, whil
Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MorePersistence of antibiotics in the aquatic environment has raised concerns regarding their potential influence on potable water quality and human health. This study analyzes the presence of antibiotics in potable water from two treatment plants in Baghdad City. The collected samples were separated using a solid-phase extraction method with hydrophilic-lipophilic balance (HLB) cartridge before being analyzed. The detected antibiotics in the raw and finished drinking water were analyzed and assessed using high-performance liquid chromatography (HPLC), with fluorometric detector and UV detector. The results confirmed that different antibiotics including fluoroquinolones and
Background: Human Cytomegalovirus (HCMV) infects a wide range of human cells, including colonic epithelial cells that give rise to adenomas and adenocarcinomas. Persistent productive infection of tumor cells is essential for oncomodulation by HCMV.This study aimed to detect HCMV matrix protein using in situ hybridization technique (ISH) in colorectal adenocarcinoma compared to normal colon tissues, and to the presence of cytomegalovirus inclusion bodies in infected colorectal carcinomas.
Patients and methods: Twenty six of colorectal adenocarcinomas were obtained in paraffin-blocks compared to 10 normal colon specimens which were age and sex matched as control group. Detection of HCMV was obtained by in s
Background:Pediatric acute myeloid leukemia (AML) has a poor prognosis, and novel therapies are needed. The FLT3 tyrosine kinase inhibitorsrepresents a promising target in pediatric AML.
Objectives:This study was done to estimate the frequency of FLT3- ITD mutation in childhood acute myeloid leukemia using conventional PCR & correlate this mutation with the clinical presentation and response to induction therapy.
Patients, Materials &Methods: Twenty children with AML, and 16 children with reactive bone marrow as negative control were enrolled in this study. Those patients were attending Child Welfare Teaching Hospital in Baghdad from March 2010 to July 2011 .For each patient hematological investigations including complete b
The diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection
... Show MoreTotal of 46 isolates of Klebsiella pneumoniae were collected from patients attending (Al-Yarmook Hospital and Education Labs / medical city), and isolates were re-identified, depending on morphology and biochemical tests . Disk diffusion method was employed to determine antibiotic susceptibility of forty six isolates by using eleven antibiotics .The results revealed the sensitivity of six isolates (9.3%) to Imipenem and Meropenem . On the other hand the isolates were showed 23.9% resistant against Ciprofloxacin, while some isolates shown higher resistant against several antimicrobial agents such as 65.2%, 69.0% for Amikacin and Cefepime consequently , 71.1%, 71.7 % for Amoxicillin -Clauvulanic acid and Gentamicin and 82.6% against Pipera
... Show MoreBackground: Chronic periodontitis defined as “an infectious inflammatory disease within supporting tissues of the teeth, progressive attachment loss and bone loss". Aggressive periodontitis is rare which in most cases manifest themselves clinically during youth. It characterized by rapid rate of disease progression .Pro-inflammatory chemokines organized inflammatory responses. Granulocyte chemotactic protein 2 is involved in neutrophil gathering and movement. The purpose of the study is to detect serum of Granulocyte Chemotactic Protein 2 and correlate to periodontal condition in patients with chronic periodontitis, Aggressive periodontitis and Healthy Control subjects and measurement the count of neutrophils for the studied groups. S
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the