The current study was conducted in Baghdad governorate (Karkh and Al-Rasafa regions) which included collecting 50 samples of freshly slaughtered sheep meat randomly collected from local slaughter areas and approved governmental slaughterhouses (25 liver and 25 ulna muscles). The results of the aflatoxin B1 detection showed that all samples were contaminated with this toxin at different concentrations ranging from 25–422 ppb and 65–492 ppb for each ulna muscles and liver, respectively. The histopathological and immunological study was conducted in meat samples containing higher and lower concentrations of the toxin. The results of the pathological study in the liver revealed that the concentration (492 ppb) caused thickening of the nuclei, water degeneration and necrosis, but the concentration (467 ppb) caused several damages represented by thickening of the nuclei and an increase in the number of kepffer cells. In contrast, no obvious damages was observed at the concentration (65 ppb). In the muscles, the results showed that the concentrations (422 and 384 ppb) caused tissue damage represented by the homogeneous acid aggregation, while no damage was found at the concentration 25 ppb. The findings of the immunohistochemical study showed the same concentrations for both liver and muscle samples using CD marker of TNF-α; in the liver, at the concentration (492 ppb), there was strong immune expression (+++), while the immune expression was (++) at the concentration (467 ppb), and no expression (-) was detected at the concentration (65 ppb). In addition, the results in the muscles samples showed that samples that contain (422 ppb), the immune expression was (+++), while the expression at the concentration (384 ppb) was (++), whereas no expression was seen at the concentration (25 ppb).
Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreIn modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show MoreThe purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show MoreIn this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
Simulation of direct current (DC) discharge plasma using
COMSOL Multiphysics software were used to study the uniformity
of deposition on anode from DC discharge sputtering using ring and
disc cathodes, then applied it experimentally to make comparison
between film thickness distribution with simulation results. Both
simulation and experimental results shows that the deposition using
copper ring cathode is more uniformity than disc cathode
This study aimed to assess the efficiency of Nerium oleander in removing three different metals (Cd, Cu, and Ni) from simulated wastewater using horizontal subsurface flow constructed wetland (HSSF-CW) system. The HSSF-CW pilot scale was operated at two hydraulic retention times (HRTs) of 4 and 7 days, filled with a substrate layer of sand and gravel. The results indicated that the HSSF-CW had high removal efficiency of Cd and Cu. A higher HRT (7 days) resulted in greater removal efficiency reaching up to (99.3% Cd, 99.5% Cu, 86.3% Ni) compared to 4 days. The substrate played a significant role in removal of metals due to adsorption and precipitation. The N. oleander plant also showed a good tolerance to the uptake of Cd, Cu, and Ni ions fr
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreA joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show More