The current study included the collection of 175 samples (blood-urea) of patients suffering from rheumatism, collected from Baghdad Teaching Hospital (Educational Laboratory), Al-Kindy Teaching Hospital, Al-Imamian Al-Kadhimya in Medical City in Baghdad at different duration between 2016/10/1-2017/2/1. The bacterial growth results showed that 80% of urea samples positive for bacterial culture, while the rate of samples did not show any bacterial grow this 20%. The isolation subjugates to morphological, microscopically and biochemical tests, as also diagnosis by Api system. The most frequent bacterial pathogenic is E. coli which appeared highly rate (41.97)% followed by E. cloacae (21.25)%, P. aeruginosa (12.5)%, Salmonella (10)% and the proportion of K. pneumonia (7.5)%, while S. marcescens showed (6.25)%. When the measurement of the concentration of liver enzymes Glutamic Oxalate Transaminase (GOT), Glutamic Pyruvate Transaminase (GPT), Alkaline phosphates’(ALP), the results showed a significant degreaseP≤ 0.05 in the level of enzyme GPT in patients serum which reachto16. 94±0.84 mg/ml, while its level in the healthy serum was 0.68±6.78 mg/ml. ALP enzyme results showed non-significant high atP≤ 0.05 in the level of patients serum with rheumatoid arthritis, as it reached the level in the serum 2.46±134.42 mg/ml, while the level in the healthy serum was 0.50±4.11 mg/ml. The enzyme GOT showed on-significant high at P≤ 0.05 in the level of patients serum as it reached the level in the serum 0.88±21.51 mg/ml, while the level in the healthy serum was 0.50±4.11 mg/ml.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreIn this article it is proved experimentally that the photon is a particle that has mass and constant wavelength by explaining the effect of refractive index on the wavelength and the natural mass of photon. It is very difficult to measure the mass of photon, a simple and easy process was proposed in this paper to calculate the mass length of photon in vacuum (Y) and in medium (Y*), by measuring the length of laser beam in air (Lair) and in medium (Lmed). A new method was postulated to calculate refractive index by using these relations (n = Y*/Y), and (n = Lmed / Lair) which supposed a new theory of light.
The study includs,effect of concentration of Lead 0.2 ,0.3 , 0.5, 5 , 10 mg/L and Zinc 0.1,0.5 , 2 , 4 , 8 mg/L lonely or to gether on growth green algae( Scenedesmus quadricauda var . longispina) according to the total qauntity for the cells and the adsorption of the algae to the zn,pb concentration .growth curve and dubbling time growth were calculated with or without there heavy metals . Results shows that there are significant differences (P<0.01) for growth curve and the control. (7.5201 cell /h)and with dubbling times (9.87 cell/h). The heavy metals(Pb, Zn). shows antagonistic effect when both used in media.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreAbstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show MoreIndia is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called