Preferred Language
Articles
/
jnhm-271
MOLECULAR IDENTIFICATION AND PHYLOGENETIC-TREE ANALYSIS OF MONIEZIA SPECIES FROM SHEEP IN AL-DIWANIYAH CITY
...Show More Authors

    The present study was performed to detect the molecular and the phylogenetic identification of species that belonging to the genus of Moniezia Blanchard, 1891 which affected intestines of sheep in Al-Diwaniyah city, Iraq; fifty intestine samples were sought for the infestation of Moniezia spp. from the city slaughterhouse from 1 October to 30 November 2017, this tapeworm was found to infest the intestines of 13 sheep.

 

    For morphological identify the genus of this tapeworm, eggs from one gravid proglottid of the thirteen worms were examined, polymerase chain reaction (PCR) and the PCR-product-based sequencing were applied on 4 Moniezia tapeworms targeting a specific region of the 18S rRNA gene.

 

    The sequencing has shown 2 species of Moniezia, SP1 and SP2 ,these two species revealed close matching on the phylogenetic tree to an according to the current study findings, Moniezia spp. affect on sheep in the city of Al-Diwaniyah, Iraq, these findings give interesting information about the evolution history of this worm in the studied city.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Explanation of the book Al-I'tikaaf  From the Al-Dura system            Luminous - of the Sarsi Hanbali brand
...Show More Authors

Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his whole family and companions, but after: God Almighty has instituted types of acts of worship and classes of obedience that, if performed by the servant, would link him with his Creator and connect with his Lord. And for the sake of these worship, and the greatest of them: the worship of i'tikaaf, for souls need rest and recuperation from the struggle of life and its concerns, concerns and anguish, and people differ in their attitudes and interests in the means of recreation, and many people consider the outing and travel the best way in which they breathe from their toil and toil, and reclaim their strength and the advised adult He fin

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Gsc Biological And Pharmaceutical Sciences
Using the silicon (luminal cast plastination technique) for the lower respiratory tract in sheep as an alternative to cement
...Show More Authors

The lower respiratory tract of sheep was studied to determine the torsion and branching of the bronchial tree. The respiratory system of ruminants and all living organisms is one of the most important organs in the body that controls the amount of gas exchange between the heart and lungs through the airways, it is clear that in sheep it consists of a narrow bronchial tube that reaches the extent of lung tissue repercussions. He used silicon, water, acid, and at room temperature, and the substance was injected with an injection gun through the trachea and was pushed gently to spread and distribute in all parts of the lungs with moderate manual pressure. The results showed that the mold shape in the lung and the bronchial branches of

... Show More
View Publication
Crossref
Publication Date
Sat Nov 30 2019
Journal Name
Journal Of Engineering And Applied Sciences
Distribution of Land Surface Temperatures from Satellite Images for Al-Hammar Marshes In Iraq
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Mathematical Model for BOD in Waste Water Discharges from Al Dora Refinery in Baghdad
...Show More Authors

This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated that th

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Mathematical Model for BOD in Waste Water Discharges from Al Dora Refinery in Baghdad
...Show More Authors

This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there
is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Surgical variables analysis of 116 cases of ovarian cystic diseases in Al- Elwiya maternity teaching hospital at 2013
...Show More Authors

Background: The treatment of an ovarian cyst relies on its nature, the discrimination of benign and malignant cysts is, therefore of crucial importance, and in spite of the continuous improvement of diagnostic means, it remains sometimes impossible to differentiate functional from organic (malignant or not) ovarian cysts. The therapeutic decision will search for the main midway between cancer’s negligence and the fear of performing an unnecessary surgical operation for an ovarian cyst.Objective: To review of 116 cases of ovarian cystic diseases aiming in identify proper management and reducing unnecessary surgical intervention.Methods: A retrospective study was conducted at Al-Elwiya maternity teaching hospital/ Baghdad/ Iraq. One hund

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Synthesis, characterization, molecular docking, ADMET prediction, and anti-inflammatory activity of some Schiff bases derived from salicylaldehyde as a potential cyclooxygenase inhibitor
...Show More Authors

A series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF