There are growing concerns over the possibility of transfer genetically modified
sequences from genetically modified feed component (GM feed) to animals and
their products, moreover, affect these sequences on animal and human health. This
study was implemented to detect P35S in modified feed by using PCR technique by
detecting presence P35S promoter, which responsible for the regulation of gene
expression for most of the transgenic genes. Thirty eight feed samples were
collected from different sources of Baghdad markets, which have been used for
feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded
feed. Genomic DNA was extracted by using two methods, CTAB method and
Wizard kit. In order to verify the presence (P35S) in feed samples, a pair of primer
for 35S promoter was used. The results of the present study showed that 58% of
tested samples contained promoter P35S this means presence genetically modified
feed in the Baghdad market
Sludge from stone-cutting (SSC) factories and stone mines cannot be used as decorative stones, stone powder, etc. These substances are left in the environment and cause environmental problems. This study aim is to produce artificial stone composite (ASC) using sludge from stone cutting factories, cement, unsaturated resin, water, silicon carbide nanoparticles (SiC-NPs), and nano-graphene oxide (NGO) as fillers. Nano graphene oxide has a hydrophobic plate structure that water is not absorbed due to the lack of surface tension on these plates. NGO has a significant effect on the properties of artificial stone due to its high specific surface area and low density in the composite. Its uniform distribution in ASC is very low due to its hydropho
... Show MoreShort Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato
... Show MoreBackground: Studying and investigating the transverse strength(Ts), impact strength(Is), hardness (Hr) and surface roughness(Ra) of conventional and modified autopolymerizing acrylic resin with different weight percentages of biopolymer kraftlignin, after curing in different water temperatures; 40°C and 80°C. Material and Methods: Standard acrylic specimens were fabricated according to ADA specification No.12 for transverse strength, ISO 179 was used for impact testing, Shore D for hardness and profilometerfor surface roughness. The material lignin first dispersed in the monomer, then the powder PMMA is immediately added. Ligninadded in different weight percentages. Then cured using pressure pot (Ivomet) in two temperatures;40°C a
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreNowad ays, with the development of internet communication that provides many facilities to the user leads in turn to growing unauthorized access. As a result, intrusion detection system (IDS) becomes necessary to provide a high level of security for huge amount of information transferred in the network to protect them from threats. One of the main challenges for IDS is the high dimensionality of the feature space and how the relevant features to distinguish the normal network traffic from attack network are selected. In this paper, multi-objective evolutionary algorithm with decomposition (MOEA/D) and MOEA/D with the injection of a proposed local search operator are adopted to solve the Multi-objective optimization (MOO) followed by Naï
... Show MoreThe novel coronavirus 2019 (COVID-19) is a respiratory syndrome with similar traits to common pneumonia. This major pandemic has affected nations both socially and economically, disturbing everyday life and urging the scientific community to develop solutions for the diagnosis and prevention of COVID-19. Reverse transcriptase-polymerase chain reaction (RT–PCR) is the conventional approach used for detecting COVID-19. Nevertheless, the initial stage of the infection is less predictable in PCR tests, making early prediction challenging. A robust and alternative diagnostic method based on digital computerised technologies to support conventional methods would greatly help society. Therefore, this paper reviews recent research bas
... Show MoreWith the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper, presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench
... Show MoreDropping packets with a linear function between two configured queue thresholds in Random Early Detection (RED) model is incapable of yielding satisfactory network performance. In this article, a new enhanced and effective active queue management algorithm, termed Double Function RED (DFRED in short) is developed to further curtail network delay. Specifically, DFRED algorithm amends the packet dropping probability approach of RED by dividing it into two sub-segments. The first and second partitions utilizes and implements a quadratic and linear increase respectively in the packet dropping probability computation to distinguish between two traffic loads: low and high. The ns-3 simulation performance evaluations clearly indicate t
... Show MoreThe density functional B3LYP is used to investigate the effect of decorating the silver (Ag) atom on the sensing capability of an AlN nanotube (AlN-NT) in detecting thiophosgene (TP). There is a weak interaction between the pristine AlN-NT and TP with the sensing response (SR) of approximately 9.4. Decoration of the Ag atom into the structure of AlN-NT causes the adsorption energy of TP to decrease from − 6.2 to − 22.5 kcal/mol. Also, the corresponding SR increases significantly to 100.5. Moreover, the recovery time when TP is desorbed from the surface of the Ag-decorated AlN-NT (Ag@AlN-NT) is short, i.e., 24.9 s. The results show that Ag@AlN-NT can selectively detect TP among other gases, such as N2, O2, CO2, CO, and H2O.
Many carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system