AbstractBackgroundLeishmaniasis is endemic in Iraq, where both cutaneous and visceral forms of the disease are reported.ObjectivesTo determine the prevalence of cutaneous leishmaniasis (CL) and to identify associations of CL with age, sex, season, and provinces depending on some demographic and climatic aspects.MethodsThis study is retrospective and includes reported cases of infections using the available surveillance database taken from the Iraqi Ministry of Health for the years 2011, 2012, and 2013 for all provinces of Iraq.ResultsMen and boys were found to be at higher risk for CL compared with women and girls. The majority of cases were recorded among those in age groups 5–14 and 15–45 years old. Most cases were recorded from lowla
... Show MoreEvaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed
... Show MoreShear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity fr
... Show MoreConducted Althilelat chemical models of crude oil back to the reservoir Fertile from the fields of Baghdad and Kut and models of crude oil back to the reservoir ??????? of Haklbe Tikrit and Baghdad were calculated their properties Alvezaúah Kalkthaqh and weight, quality and degree of August j (API) and know the quality Nfothma that was light or heavy and make the comparison between Alinvtin also conducted chemical analyzes of the two models of Almia associated with each of the oil above Almkmnin and measured Ktvthma and Zojithma and concentrations of some dissolved salts in them and clarify the relationship between the oil reservoir and water associated with oil fields...
This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreA number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col
... Show More