To maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, were used to compare the results of the methods with the provision of a minimal environmental flow. The Tennant method relies on 30 % of the annual discharge rate as the minimum environmental instream flow. The modified Tennant method is based on 30% of the monthly average discharge rate as a minimum environmental instream flow. The 7Q10 method is based on the lowest daily discharge rate in 7 consecutive days for ten years. The results showed that the minimum instream environmental flow given by the Tennant method is 42.26 m3/s while the lowest value of the minimum instream environmental flow obtained from modified Tennant was 37.2 m3/s in January, and the largest value was 47.22 m3/s in August. The one obtained by the 7Q10 method was 50 m3/s in this research.
Papillary thyroid carcinoma (PTC) represents the most prevalent kind of thyroid gland cancer, making up around 80% of all occurrences of thyroid cancer. Evidence shows that Syndecan-1 (SDC-1) expression is lost in a number of benign and malignant epithelial neoplasms, although its expression profile in thyroid gland neoplasms is yet unknown. Therefore, the aim of this study was to assess SDC-1 expression in papillary thyroid carcinoma patients, as well as the relationship between age and gender and SDC-1 expression. To undertake a detailed investigation of SDC-1 in normal and malignant tissues, tissue sections were used to examine SDC-1 expression in 70 tissue samples, 50 distinct PTC (6 males and 44 females) and 20 normal tissue ty
... Show MoreA literary text is not void of the use of the ego and the other while speaking or in a spoken communication. Such a usage is apparently outstanding in Arabic literature, and it reflects society in all its various cultural, social and political conditions. Therefore, the ego is one of the prominent concepts on which human personality is built, and its role in the formation of society and in communicating among all human societies. Accordingly, the present paper aims to clarify the duality of the ego and the other, where the ego starts from the poet himself to expand the circle of subjectivity by including his family, society, immediate surroundings, race and his religion. The other, on the other hand, that is separated from the poet,
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe mind map represents a system to solve problems including design problems, because it depends on employing the complex and purposeful mental activity, which starts from a desire based on the search and investigation in order to reach integrated results of scientific thinking, utilizing the objective view of the scientific and practical aspects from various angles. This visual system can develop thinking and shorten the retrieval time of the previous information in order to employ it in the solution finding system, that it evokes past experiences and relates them to current situations, then enables the user to choose a suitable solution for the problems. This visual, educational and circulatory means, at the same time, has speci
... Show MoreSub-threshold operation has received a lot of attention in limited performance applications.However, energy optimization of sub-threshold circuits should be performed with the concern of the performance limitation of such circuit. In this paper, a dual size design is proposed for energy minimization of sub-threshold CMOS circuits. The optimal downsizing factor is determined and assigned for some gates on the off-critical paths to minimize the energy at the maximum allowable performance. This assignment is performed using the proposed slack based genetic algorithm which is a heuristic-mixed evolutionary algorithm. Some gates are heuristically assigned to the original and the downsized design based on their slack time determined by static tim
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of