The Main Outfall drain pumping station in Nassiriyah is an important part in operation system of the Main Outfall Drain (MOD) where it reduces the water levels in the U/S area of its and converted through Syphon freely under the Euphrates, its consists of several parts: U/S Basin, Station Building which contains 12 pumps, and Head Basin with Syphon, This station suffers from high levels especially in D/S area due to the current situation which is represented by establishing of dyke with pipes on MOD which located at 24 km from D/S of pumping station and Al-Khamisiyah Canal which located at 2.3 km from the U/S of dyke which feeds(Al Hammar Marsh) during drought season, several scenarios were adopted in order to explore the hydraulic effect of the current situation on the water levels and the performance of the syphon pumping system. The hydraulic effect of current situation causes an increase in D/S levels from 0.75 to 1 m,0.37to0.6m in operating (1,2)pumps, and the highest lack of the performance equal to 9.87%,5.58%,3.62%,2.62 % in operating (1,2,3,4)pumps respectively with designed head and 8.55%,5.40%,3.11%,1.8% with non- designed head.
Background: Carpal tunnel syndrome (CTS) is the most prevalent upper-limb entrapped neuropathy. A nerve conduction study (NCS) is the simplest method for identifying CTS when combined with a satisfactory clinical assessment and physical assessment. Ultrasound is a beneficial non-traumatic screening approach for CTS and there is a relationship between the NCS tests and the measures of CSA by ultrasound. Objective: to assess whether or not sonographic observations of the median nerve seems to be varied amongst DM and non-DM CTS individual. Patients and methods: The total of 50 non-DM Individuals with CTS and 50 DM individuals with CTS have been included in this study. All individuals were submitted to full medical assessment NCS testi
... Show MoreCO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo
... Show MoreBackground: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreBackground: Studies discussing the correlation between biochemical markers of bone turnover and the diagnosis of osteoporosis in postmenopausal Iraqi women are rare. This study is devoted to find out the significance of serum osteocalcin (OC) and osteopontin (OPN) levels with the incidence of osteoporosis and its major complication (fracture).Objectives: to investigate the significance of bone turnover biochemical markers; serum osteocalcin and serum osteopontin in evaluating osteoporosis for postmenopausal Iraqi women with and without history of vertebral fracture, as well as to explore the relationship of these markers with bone mineral density (BMD).Methods: Fifty seven postmenopausal women whose ages are fifty years old and over, cat
... Show MoreThe evacuated tube solar collector ETC is studied intensively and extensively by experimental and
theoretical works, in order to investigate its performance and enhancement of heat transfer, for Baghdad climate
from April 2011 till the end of March 2012. Experimental work is carried out on a well instrumented collector
consists of 16 evacuated tubes of aspect ratio 38.6 and thermally insulated tank of volume 112L. The relation
between convective heat transfer and natural circulation inside the tube is estimated, collector efficiency, effect of
tube tilt angles, incidence angle modifier, The solar heating system is investigated under different loads pattern (i.e
closed and open flow) to evaluate the heat loss coefficient
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More