Alpha shape theory for 3D visualization and volumetric measurement of brain tumor progression using magnetic resonance images
Hot mix recycling of asphalt pavements is increasingly being used as one of the major rehabilitation methods by various highway agencies. Besides general savings in costs and energy expended, it also saves our natural resources and environment. Recycling process presents a sustainable pavement by using the old materials that could be reclaimed from the pavement; these materials could be mixed with recycling agents to produce recycled mixtures. The important expected benefits of recycling process are the conservation of natural resources and reduction of environmental impact. The primary objectives of this work are evaluating the Tensile and Shear Properties of recycled asphalt concrete mixtures, In addition to the
... Show MoreThe Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two mai
... Show MoreThe results of studying the effects of M. anisopiliae spores on mosquito, C. quinquefasciatus showed a biological effects represented by immature mortality. The mortality increased proportionally with the concentrations of fungal spores, which reached (at high concentration 2×1011 spores / ml), to 86.6, 56.6% in first and late instar larvae, respectively. An important to mention that cumulative death rate was significantly associated with the time, which reached to 56% at 7 day after treatment. In addition, M. anisopiliae had a long period permanence in aquatic habitats; in which the residual effects stay 30 days in aquatic habitats after treatment at laboratory conditions. Interestingly, the long period exposure of fungal spores (30 minut
... Show MoreThe study is concerned with the problem of the earthly identity of kindergarten children by verifying its aims in identifying the earthly identity of the first level of kindergarten children and the earthly identity of both levels of the kindergarten. The research also aims to identify the earthly identity of male and female kindergarten children. The study population is represented in public and private kindergartens on both sides of Baghdad city, Karkh & Rusafa for the academic year (2022-2023). The earthly identity test in its final form consisted of (10) items. The test was administered to a sample of (400) children in public and private kindergartens, who were selected randomly. The results showed that kindergarten children have
... Show MoreGram-positive enterococciare opportunistic and resistant to many antibiotics. This study aimed to investigate the presence of Enterococcus spp. in our community and whether these isolates are resistant to the macrolides class of antibiotics. Fifty isolates from 112 clinical samples were recognized as Enterococcus spp. and confirmed using Vitek-2 system. The current study found that 50/112 (44.6%) represented the total isolates, 38/50 (76%) of which were Enterococcus faecalis, while 12/50 (24%) were Enterococcus faecium, twenty (40%) isolates from root canals and 30 (60%) isolates from urine were isolated. The sensitivity of the enterococcal isolates to various macrolides (erythromycin, azithromycin and clarithromycin) antibiotics wa
... Show MoreDiscotic liquid crystal compounds were synthesized and characterized. Liquid crystalline texture of these compounds was investigated by polarized optical microscopy (POM). The Hartree-Fock approximation (HF) was used to calculate theoretical molecular parameters for synthesized compounds such as optimization, hardness, EHOMO, ELUMO, and energy gap using the Gaussian 09W program.
The objective of this study was to isolate and identify the asparaginase-producing bacteria, then purify and characterize the enzyme in order to investigate their properties in the future. Fifteen local bacterial isolates were isolated from various sites in the city of Baghdad, identified by conventional morphological and biochemical procedures, and confirmed using vitek 2 methods, and submitted to primary screening processes for asparaginase production. For secondary screening, eight isolates with the greatest yellow zone ability on a specific solid medium were chosen. Bacillus sp. was reported to have the highest enzyme production (7.5 U/mg proteins). After 24 hours of incubation, submerged fermentation yielded optimal conditi
... Show MoreThe text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More