Background: The acquired immunodeficiency syndrome (AIDS) is a disorders caused by cellular and humoral immune dysfunction from infection by the human immunodeficiency virus (HIV 1 and HIV 2).
Patients and Methods: The study was carried out in Kirkuk governorate on 5090 secondary school students from different localities of the city, for the period from the beginning of October 2005 to the end of March 2006. A special questionnaire was applied for each student containing age, sex, class, parent’s education, mode of transmission & methods of prevention.
Results: There was no significant difference between male and female regarding the etiology of AIDS.The knowledge of secondary school students was not related to parent's education.
Conclusions: It is concluded that educational lectures increased the knowledge of students.
It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
This study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these
... Show MoreThe study aimed to increase the biological value of white bean. The effect of different concentrations 0.01 ,0.02,0.03,and 0.04 M of sodium sulfite solutions for 1hr at 70 ºC on the trypsin inhibitors activity, protein isolate and protein solubility of complete and dehulling white bean flour were studied.Trypsin inhibitors activity were reduced by 42.97, 58.69, 68.59 and 69.58% in complete white bean flour at 0.01 ,0.02, 0.03, 0.04 M respectively, while the corresponding values were 50.43, 61.00, 75.61 and 85.66% respectively in dehulling white bean flour .Protein isolate value was 13.41% and protein solubility was 2.2% in control sample, Furthermore, the using of chemical treatment showed that protein isolate was reduced gradually and
... Show MoreThe unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:
- Apparent resistivity Rwa
- Rxo /Rt
The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu
... Show MoreThis study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreIn this paper we study and design two feed forward neural networks. The first approach uses radial basis function network and second approach uses wavelet basis function network to approximate the mapping from the input to the output space. The trained networks are then used in an conjugate gradient algorithm to estimate the output. These neural networks are then applied to solve differential equation. Results of applying these algorithms to several examples are presented
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More