Magnetized iron oxide nanoparticles (NPs) were prepared using Eucalyptus leaf extract and then coated with CTAB (Cetrimonium bromide) to increase efficiency. The prepared and modified (NPs) were characterized using AFM, FTIR, and X-ray techniques. The adsorption of the dye reactive blue RB 238 on coated (NPs) was investigated. The effect of various experimental factors, such as the initial concentration of the dye, the amount of adsorbent, pH and temperature on the removal of RB238 was studied. The best conditions for dye removal were found to be 298 K in an acidic medium of pH = 3 and an appropriate dose of the adsorbent of 0.15 g per 25 mg/L to achieve the best color removal of 90% within 60 minutes. The pseudo-second-order re
... Show MoreVariations in perspective, illumination, motion blur, and weatherworn degeneration of signs may all be essential factors in road-sign identification. The current research purpose is to evaluate the effectiveness of the image processing technique in detecting road signs as well as to find the appropriate threshold value range for doing so. The efficiency of the cascade object detector in detecting road signs was tested under variations of speed and threshold values. The suggested system involved using video data to calculate the number of frames per second and creating an output file that contains the specified targets with their labels to use later in the final process (i.e., training stage). In the current research, two videos
... Show MoreThe objective of this research is to select the most suitable drilling location of new groundwater exploration wells, with a decision-making tool from Geographic Information System (GIS). The optimum location will be evaluated base on the hydro-geoelectrical parameter derived from Vertical Electrical Sound (VES) including Longitudinal Conductance, the thickness of the aquifer, the apparent resistivity and Transmissivity. From the Geo-electrical method (VES) the finds shows that the aquifers in the study area have Apparent Resistivity ranging from 0.32 to 40.24 Ωm, Thickness between 0.21 m to 15.06 m, Longitudinal Conductance ranging from 0.006 to 10.246Ω-1 and Transmissivity ranging from 0.14 to
... Show MoreIn this paper, mixed spinel Co0.4Zn0.6Fe2O4 ferrite was synthesized by microwave-assisted combustion method. Photocatalytic activity of the as-synthesized sample was investigated against methylene blue dye at room temperature at different exposure times (60-360 min.) under visible light. Phase impurity and surface morphology which are investigated with XRD analysis and field emission- scanning electron microscopy, indicate that a cubic spinel unit cell structure with a crystilite size and lattice constant are 22.5048nm and 8.37Å, respectively. The saturation magnetization exhibited directly from the hysteresis loop is (70.20emu/g). Optical properties for the investigated ferrite
... Show MoreEuphorbia lateriflora is a popular traditional medicinal plant whose leaves are used in Africa, especially Nigeria, to treat wounds and many diseases. This study investigated the preliminary phytochemical constituents, secondary metabolites by High-Performance Liquid Chromatography “HPLC” technique, and antimicrobial potentials (Minimum Inhibitory Concentration “MIC”, Minimum Fungicidal Concentration “MFC” and disc diffusion assay) of various concentrations (100 mg/mL, 50 mg/ml, and 25 mg/mL) of the solvents (ethyl acetate and n-hexane) extracts of E. lateriflora against Staphylococcus aureus, Escherichia coli and Candida albicans. The phytochemical screening revealed that
... Show MoreSystemic Lupus Erythematosus (SLE) is a multifactorial chronic systemic autoimmune disease. It is characterized by a lack of immune tolerance to autoantigens such as nuclear antigens. The aim of the study is to assess the interferon-alpha (IFN-α) serum level in Iraqi patients with SLE and determine its potential relation to different clinical and laboratory parameters and disease activity. 100 SLE patients were all females and with a mean of age 31.3 ± 10 years (16-63years) and disease duration of 5.8 ± 3.7years (1 month to 15 years). The average of SLEDAI score ranged from 2 to 22 with a mean of (8.53 ±3.42). Proteinuria, ESR, creatinine and AST were significantly higher (65% vs. 10% and 0.62±0.11 vs. 0.70±0.14 mg/dl resp
... Show MoreThe urbanization and climate change phenomena are global problems whose negative effects have been exacerbated in cities, and they are a reason for the formation of global warming and urban heat islands. The research came to shed light on the urban expansion of Baghdad for four decades which extended between (1981-2021) using the ArcMap Gis10.7 technique, then evaluating the impact of this expansion on the city’s climate. The climate data were taken from Baghdad station by remote sensing technique for the same period. To clarify and analyse the relationship between the expansion and climatic data, Microsoft Excel was used. The results indicated a strong relationship between them, as urbanization rates increased, especially during the f
... Show MoreIn gene regulation, transcription factors (TFs) play a key function. It transmits genetic information from DNA to messenger RNA during the process of DNA transcription. During this step, the transcription factor binds to a segment of the DNA sequence known as Transcription Factor Binding Sites (TFBS). The goal of this study is to build a model that predicts whether or not a DNA binding site attaches to a certain transcription factor (TF). TFs are regulatory molecules that bind to particular sequence motifs in the gene to induce or restrict targeted gene transcription. Two classification methods will be used, which are support vector machine (SVM) and kernel logistic regression (KLR). Moreover, the KLR algorithm depends on another regress
... Show MoreInternet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp
... Show MoreIn this research, we discussed bone density for women taking into consideration the method of research, we measure the total body mass of women in premenopausal and comparing it with postmenopausal, since the amount of the bone mineral content and bone mineral density, fat mass and lean mass.
A cross sectional study conducted at DXA laboratory, Physiology Department, College of Medicine, University of Ninevah, Mosul-Iraq from Jan. 1 - Dec. 31, 2013. Since 174 healthy women recruited from reviewing of college medical academic center. They were divided into two groups: pre menopause group (n = 42) and post menopause group (n= 130). Detailed anthropometric data were gathered from study subjects. The mean age SD of pre-menopause group was
Vegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a low v
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreThe Yamama Formation belongs to the late Berriasian-Aptian succession, which was deposited during the Lower Cretaceous period within the main shallow marine depositional environment.
Petrographic study and microfacies analysis enabled the recognition of six main microfacies for three association facies. These are the Semi-restricted, Shallow open marine and Shoal environments. The study succession represents deposition of three third order cycles, these cycles where deposited during successive episodes of relative sea level rises and still stand.
The presence of shoal association facies (oolitic packstone microfaces) between the Sulaiy and Yamama formations refer to continue the deposition during the same stage, and may s
... Show MoreThe present study includes the evaluation of petrophysical properties and lithological examination in two wells of Asmari Formation in Abu Ghirab oil field (AG-32 and AG-36), Missan governorate, southeastern Iraq. The petrophysical assessment was performed utilizing well logs information to characterize Asmari Formation. The well logs available, such as sonic, density, neutron, gamma ray, SP, and resistivity logs, were converted into computerized data using Neuralog programming. Using Interactive petrophysics software, the environmental corrections and reservoir parameters such as porosity, water saturation, hydrocarbon saturation, volume of bulk water, etc. were analyzed and interpreted. Lithological, mineralogical, and matrix recogniti
... Show MoreThis research deals with analyzing samples of water from the Euphrates River before and after (50m, 200m, 500m, and 1000m from the outflow)the power plant of AL-Musayyab. A Water Quality Index (WQI) analysis was performed, which is a helpful tool for rapid estimation of the quality of any water resource.. Water quality of the river was classified into good, poor, very poor, and unsuitable for drinking, based on physico-chemical parameters such as pH, total hardness (TH), and concentrations of the major ions of calcium (Ca+2), sodium (Na+), magnesium (Mg+2), potassium (K+), nitrate (NO3-2), sulphate (SO4-2), phosphate (PO4-2), and Chloride (Cl-),
... Show MoreAttempts were made over the years to achieve economic and easy methods for water purification. This could well save time, cost, and earn a good process quality for many countries. This study aims to enhance the purification process parameters for Congo red dye polluted water and introduce a developed methodology with an impact on many associated parameters such as the time for water purification process. The research proposes a method to achieve this time reduction by mixing gold nanoparticle (AuNPs) (prepared by chemical reduction method) with Titanium dioxide nanoparticles (TiO2NPs) (prepared by sol-gel techniques). The resulting mixture is incorporated into PVA host to synthesize a hard disk used as a purification d
... Show MoreInternet of Vehicle (IoV) is one of the most basic branches of the Internet of Things (IoT), which provides many advantages for drivers and passengers to ensure safety and traffic efficiency. Most IoV applications are delay-sensitive and require resources for data storage and computation that cannot be afforded by vehicles. Thus, such tasks are always offloaded to more powerful nodes, like cloud or fog. Vehicular Fog Computing (VFC), which extends cloud computing and brings resources closer to the edge of the network, has the potential to reduce both traffic congestion and load on the cloud. Resources management and allocation process is very critical for satisfying both user and provider needs. However, th
... Show MoreMultiple sclerosis (MS) is one of an autoimmune condition with uncertain etiopathology. According to new data, ABO system had played a role in the development and understanding numerous diseases. Lower level of 25-hydroxy vitamin D3 (25-OHD3) is considered as a risk factor for MS. The aims of this study is to identify the role of blood group distribution on the levels of parathyroid hormone (PTH), 25-OHD3, total calcium, inorganic phosphorus and total magnesium on MS patients. Additionally, we assessed the relation between Expanded Disability Status Scale (EDSS) and study parameters in patients. The Study included 107 patients with MS were distributed in to four groups according to their blood group (A, B, AB, and O). Additi
... Show MoreThe main goal of this study was to assess the climatic parameters in a valuable basin in northern part of Iraq, Erbil central sub-basin. Rainfall, relative humidity, temperature, evaporation, sunshine duration, and wind speed are the climate variables used in this study. The investigated periods (1980-2021) of Erbil meteorological data were used to assess the climatic and drought conditions in the studied basin. The results show a noticeable drop in relative humidity and rainfall over the past two decades, as well as a considerable rise in temperature and evaporation. The mean annual rainfall was 416mm, relative humidity is 48.74% used as term of water availability, and mean annual temperature is 22°C, total an
... Show MoreThe process of converting coordinates is, still, considered an important and difficult issue due to the way of conversion from geographic ellipsoidal system to the projected flat system. The most common method uses contiguous UTM system as one of the most accurate systems in the conversion process, but the users of the
system face problems related to contiguity, especially at the large areas that lie within more than one zone. The aim of the present research is to solve the problem related to the multiple zones coverage found in the Iraqi territory using a mathematical model based on the use of Taylor series. The most accurate conversion equation used in this paper was based on the 4th order polynomial of two variables. The calculatio
A precise, simple, and accurate continuous flow injection technique was used for the instantaneous estimation of bromhexine hydrochloride (BH-HCl) in tablet dosage form. The chemical and physical parameters of the reaction of BH-HCl with tetraphenylborate to produce a yellowish-white precipitate were determined using an ISNAG fluorimeter analyzer and diverging light at 90°. The calibration curve for BH-HCl was linear with correlation coefficients of 0.9994 and linearity percentage r2% = 99.87 over a concentration range of 0.01-20 mmol/L, L.O.D = 0.3610 µg/125µL (0.007 mmol/L), and RSD% less than 0.3% for 3 and 13 mmol/L (five replicates). This approach was efficiently used to estimate the levels of BH-HCl in two distinct pharmaceutica
... Show MoreThe texture analysis of cancer cells leads to a procedure to distinguish spatial differences within an image and extract essential information. This study used two test tumours images to determine cancer type, location, and geometric characteristics (area, size, dimensions, radius, etc.). The suggested algorithm was designed to detect and distinguish breast cancer using the segmentation-based threshold technique. The method of texture analysis Grey Level Size Zone method was used to extract 11 features: Small Zone Emphasis, Large Zone Emphasis, Low Grey Level Zone Emphasis, High Grey Level Zone Emphasis, Small Zone Low Grey Level Emphasis, Small Zone High Grey Level Emphasis, Large Zone Low Grey Level Emphasis, Large Zone High Gre
... Show MoreCloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim
... Show MoreAs a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio
... Show MoreIn this paper, a new idea to configure a special graph from the discrete topological space is given. Several properties and bounds of this topological graph are introduced. Such that if the order of the non-empty set equals two, then the topological graph is isomorphic to the complete graph. If the order equals three, then the topological graph is isomorphic to the complement of the cycle graph. Our topological graph has complete induced subgraphs with order or more. It also has a cycle subgraph. In addition, the clique number is obtained. The topological graph is proved simple, undirected, connected graph. It has no pendant vertex, no isolated vertex and no cut vertex. The minimum and maximum degrees are evaluated. So , the radius
... Show MorePolyaniline (PANI) polymer was successfully prepared by the chemical oxidation method at 0 oC. Polyaniline-nano grapheme (GN) powder nanocomposites were prepared by the addition of GN with different weight ratios (0.1, 1, 5, and 10 g wt. %) during the polymerization of PANI. It was found that the polymerization reaction of poly-aniline was exothermic. The effect of adding nano-graphene powder during polymerization process on the time and temperature of the reaction was studied. The resulting polymer was diagnosed using several methods, including Fourier transform infrared spectroscopy (FT-IR) and UV-VIS spectrophotometry. The results of FTIR demonstrated a shift to higher wave numbers in the peaks of nanocomposites, due
... Show MoreThe Arabic Language is the native tongue of more than 400 million people around the world, it is also a language that carries an important religious and international weight. The Arabic language has taken its share of the huge technological explosion that has swept the world, and therefore it needs to be addressed with natural language processing applications and tasks.
This paper aims to survey and gather the most recent research related to Arabic Part of Speech (APoS), pointing to tagger methods used for the Arabic language, which ought to aim to constructing corpus for Arabic tongue. Many AI investigators and researchers have worked and performed POS utilizing various machine-learning methods, such as Hidden-Mark
... Show MoreIn this paper, the necessary optimality conditions are studied and derived for a new class of the sum of two Caputo–Katugampola fractional derivatives of orders (α, ρ) and( β,ρ) with fixed the final boundary conditions. In the second study, the approximation of the left Caputo-Katugampola fractional derivative was obtained by using the shifted Chebyshev polynomials. We also use the Clenshaw and Curtis formula to approximate the integral from -1 to 1. Further, we find the critical points using the Rayleigh–Ritz method. The obtained approximation of the left fractional Caputo-Katugampola derivatives was added to the algorithm applied to the illustrative example so that we obtained the approximate results for the stat
... Show MoreThis research includes the synthesis of new bis-Schiff bases linked to different imide cycles. There were some steps involved in the synthesis of the novel Schiff bases with succinimide, phthalimide, tetrachlorophthalimide, and tetrabromophthalimide cycles. The first step involved the preparation of 4,4`-bis[(4-aminophenyl) methyl benzylidene]tolidine (1) via the condensation reaction of 3,3'-dimethyl-(1,1'-biphenyl)-4,4'-diamine with 4-amino acetophenone. In the second step, compound 1 reacted with various cyclic anhydrides, affording bis-amic acid Schiff bases 2-5. In the third step, the products 2-5 were dehydrated using the fusion method to prod
... Show More