Preferred Language
Articles
/
jih-1125
Effect of Benzene on Some haeMatological Parameters of Oil Station Workers

  Benzene is a hydrocarbon chemical consisting of six atoms arranged in a ring structure. At normal ambient temperatures; it is a liquid, which evaporates rapidly at room temperature and is highly flammable. It has a characteristic of aromatic odor and is slightly soluble in water (1.5 g/liter at 20ºC) but miscible with most other organic solvents [1].           Long-term inhalation of benzene causes blood disorders. It specifically affects bone marrow [2]. And it may cause anemia, excessive bleeding, damage to the immune system and DNA [3, 4]. Increased incidence of leukemia (cancer of the tissues that form white blood cells) has been observed in people occupationally exposed to benzene; so (EPA) Environmental Protection Agency has classified benzene as a known human carcinogen [5].     The present study was conducted to evaluate the effect of benzene on some hematological parameters on 60 males working in different oil stations that provide benzene products for people at Waset governorate with a mean year for work duration 1 to 20 years, 8 hours of work as a mean per day.       A haemoglobin (Hb) concentrations as well as white blood cells count (W.B.Cs) and platelets count (Plt) were well observed to evaluate the effect of benzene on these parameters. Results showed that workers in oil stations indicated normal values for haemoglobin 13.2 and white blood cells (5640 cell/cmm) and platelets 261000 during the first 10 years of work.     As the duration of work progresses, results indicated that there was a gradually reduction in all parameters.
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 30 2022
Journal Name
The Journal Of Infection In Developing Countries
SARS-CoV-2 viral shedding and susceptibility: perspectives on gender and asymptomatic patients

Despite efforts to contain and manage the SARS-CoV-2 outbreak which was declared a public health emergency of international concern in January 2020 by the World Health Organization (WHO), the COVID-19 pandemic still remains a major global challenge. Patients who display the classical symptoms of the infection are easily identified, tested, isolated and monitored. However, many cases of infected asymptomatic patients have been documented. These patients are not easily identified even though many evidences suggest that they can spread the virus to others. How and why these COVID-19 asymptomatic presentations occur remain unclear. The many theories and views are conjectural, and supporting evidences are still needed. In this review, we

... Show More
Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Scopus (30)
Crossref (27)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
Biochemical & Cellular Archives
A RE-SATURATION IMPACT ON SOIL RETENTION CURVE FOR FIVE DIFFERENT TEXTURED SOILS

Soil water retention curves (SWRCs) are crucial for characterizing soil moisture dynamics and are particularly relevant in the context of irrigation management. A study was carried out to obtain the SWRC, inflection point, S index, pore size distribution curve, macro porosity, and air capacity from samples submitted to saturation and re-saturation processes. Five different-texture disturbed soil samples Sandy Loam, Loam, Sandy Clay Loam, Silt Loam, and Clay were collected. After obtaining SWRC, each air-dried soil samples were submitted to particle size distribution and clay dispersed in water analyses to verify the soil lost clay. The experimental design was completely randomized with three replications using two processes of SWRC (saturat

... Show More
Scopus (2)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Geminivirus : Detection, Diagnosis And Management
Scopus (9)
Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Scopus (133)
Crossref (98)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Offline Handwritten Signature Verification Based on Local Ridges Features and Haar Wavelet Transform

    Multiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and

... Show More
Scopus (6)
Crossref (3)
Scopus Crossref
View Publication Preview PDF