A field experiment was conducted at botanical garden of Department of Biology, College of Education for Pure Science (Ibn Al-Haitham), University of Baghdad, during the growth winter season of 2016-2017 to study the effect of different concentrations (0, 10, 20) mg.L-1 of abscisic acid and (0, 50, 100, 150) mg.L-1 of vitamin C and their interaction on some plant hormones of pea plant (Pisum sativum L.). The results showed that ABA 20 mg.L-1 decreased IAA about 27.44%, GA3 about 19.73% and Kinetin 15.37% while vitamin C with 150 mg.L-1 increased IAA 27.43%, GA3 45.31% and Kinetin 58.53%, but ABA increased about 23.01% for ABA and 34.93% for vitamin C compared with
... Show MoreThe Ciliophoran Trichodina magna Van As and Basson, 1989 is recorded for the first time in in Iraq from gills of the blue tilapia Oreochromis aureus (Steindachner, 1864) Iraq from Al-Graiat location on the Tigris River at Baghdad city. The description and measurements of this external parasite as well as its illustrations are given.
Early diagnosis of sepsis is a very critical matter especially for soldiers in battle field; on the other hand, Procalcitonin is a new promising biomarker for fast and accurate diagnosis of sepsis. The aim of this study is to investigate the ability of Procalcitonin (PCT) to indicate sepsis earlier than blood culture and other traditional biomarkers and then get use of this in early diagnosis of sepsis.Procalcitonin concentration was measured in 44 sera of Iraqi wounded soldiers who were admitted to GHAZI AL-HARIRI Hospital for surgery, using ELISA kit of BioRay/USA, along with blood culture and other infection biomarker like C-reactive protein, ESR, W.B.C. count. Six patients had elevated PCT and 3 of them
... Show MoreThe aim of this work presents the analytical studies of both the magnetohydrodynamic (MHD) flux and flow of the non-magnetohydro dynamic (MHD) for a fluid of generalized Burgers’ (GB) withinan annular pipe submitted under Sinusoidal Pressure (SP)gradient. Closed beginning velocity's' solutions are taken by performing the finite Hankel transform (FHT) and Laplace transform (LT) of the successivefraction derivatives. Lastly, the figures were planned to exhibition the transformations effects of different fractional parameters (DFP) on the profile of velocity of both flows.
With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreComputer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead
... Show MoreLet R be a commutative ring with identity, and M be a left untial module. In this paper we introduce and study the concept w-closed submodules, that is stronger form of the concept of closed submodules, where asubmodule K of a module M is called w-closed in M, "if it has no proper weak essential extension in M", that is if there exists a submodule L of M with K is weak essential submodule of L then K=L. Some basic properties, examples of w-closed submodules are investigated, and some relationships between w-closed submodules and other related modules are studied. Furthermore, modules with chain condition on w-closed submodules are studied.
In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.
Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.
In the present paper we introduce and study new classes of soft separation axioms in soft bitopological spaces, namely, soft (1,2)*-omega separation axioms and weak soft (1,2)*-omega separation axioms by using the concept of soft (1,2)*-omega open sets. The equivalent definitions and basic properties of these types of soft separation axioms also have been studied.
In this paper, we introduce a method to identify the text printed in Arabic, since the recognition of the printed text is very important in the applications of information technology, the Arabic language is among a group of languages with related characters such as the language of Urdu , Kurdish language , Persian language also the old Turkish language " Ottoman ", it is difficult to identify the related letter because it is in several cases, such as the beginning of the word has a shape and center of the word has a shape and the last word also has a form, either texts in languages where the characters are not connected, then the image of the letter one in any location in the word has been Adoption of programs ready for him A long time.&
... Show MoreThe current study is the identification and isolation dermatophyte species in clinical isolates by both Sabouraud’s Dextrose Agar (SDA) and on Dermatophyte Test Medium (DTM). Clinical specimens of hair, nails and skin scales were collected from patients with dermatophytosis and submitted to direct microscopic examination after immersion in 20% of potassium hydroxide solution. The clinical specimens were cultured on SDA containing chloramphenicol and cycloheximide, and on DTM. Tinea corporis showed the highest prevalent dermatophyte infection among patients (26.7%), followed by Tinea pedis (23.3%), whereas Tinea manuum exhibited the lowest fungal infection (6.7 %). Rural areas revealed the highest prevalence of dermatophyte in
... Show MoreThe current study was designed to evaluate the efficiency of broccoli plant in therapy of PCOS that induced for the first time by testosterone andriol (T.A).
Forty-eight immature female rats (21 days old) were divided into 6 groups (8 rats each) as follows: G1, animals were injected with sesame oil for 39 cascade days (control). G2, animals were injected with 1mg/100g b.w of T.A for 39 cascade days. G3, animals were injected with 1mg/100g b.w of T.A gathered with gavaged broccoli juice (b.j) for 39 cascade days. G4, animals were injected with sesame oil for cascade 39 days at the end of last injection were gavaged with d.w for 30 cascade days. G5, animals were injected with 1 mg/100g b.w of T.A for
... Show MoreIn our research, we introduced new concepts, namely *and **-light mappings, after we knew *and **-totally disconnected mappings through the use of -open sets.
Many examples, facts, relationships and results have been given to support our work.
The use of heavy ions in the treatment of cancer tumors allows for accurate radiation of the tumor with minimal collateral damage that may affect the healthy tissue surrounding the infected tissue. For this purpose, the stopping power and the range to which these particles achieved of Nitrogen (N) in the skin tissue were calculated by programs SRIM (The Stopping and Range of Ions in Matter),(SRIM Dictionary) [1],(CaSP)(Convolution approximation for Swift Particles )[2]which are famous programs to calculate stopping power of material and Bethe formula , in the energy range (1 - 1000) MeV .Then the semi - empirical formulas to calculate the stopping power and range of Nitrogen io
... Show MoreMeasurements of radon gas concentrations were carried out for 12 soil samples at 3 sampling depths (surface, 5 cm and 10 cm) collected from (4) locations in south Baghdad suburbs (Bu'aitha) using solid state nuclear track detector CR-39 and sealed can technique. Radon concentrations for surface samples were ranged from 402.2 to 1538.4 Bq.m-3 with an average 994.4 Bq.m-3. Whereas, radon concentration was ranged from 813.1to 2050.4 Bq.m-3 and from 1309.8 to 4626. 1Bq.m-3 with an average values of 1359.8 Bq.m-3 and 2338.3 Bq.m-3 for 5 cm and 10 cm depths respectively. Maximum radon level was found at the location near to the river (site S4) while the minimum radon level was f
... Show MoreIn the present work , radon concentration was measured indoor buildings in the College of Education for Pure Science/ Ibn Al- Haitham University of Baghdad using detector (CR-39) by counting track of alpha resulting from decay series of uranium on the detectors which have exposure to air inside the rooms for (30) days , have been applied the equation (1) and (2) to calculate concentrations of Radon and the results showed that all samples were within the allowable range globally except two samples F1 and F2 where concentrations were (445.868Bq/m3) and (436.791Bq/m3) respectively , they were higher than allowable range globally which was (200-300) Bq/m3 recorded by (ICRP) [1] .
NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Human detection represents a main problem of interest when using video based monitoring. In this paper, artificial neural networks, namely multilayer perceptron (MLP) and radial basis function (RBF) are used to detect humans among different objects in a sequence of frames (images) using classification approach. The classification used is based on the shape of the object instead of depending on the contents of the frame. Initially, background subtraction is depended to extract objects of interest from the frame, then statistical and geometric information are obtained from vertical and horizontal projections of the objects that are detected to stand for the shape of the object. Next to this step, two ty
... Show MoreThis paper investigates the capacitated vehicle routing problem (CVRP) as it is one of the numerous issues that have no impeccable solutions yet. Numerous scientists in the recent couple of decades have set up various explores and utilized numerous strategies with various methods to deal with it. However, for all researches, finding the least cost is exceptionally complicated. In any case, they have figured out how to think of rough solutions that vary in efficiencies relying upon the search space. Furthermore, tabu search (TS) is utilized to resolve this issue as it is fit for solving numerous complicated issues. The algorithm has been adjusted to resolve the exploration issue, where its methodology is not quite the same as the normal a
... Show MoreE-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreThe concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related t
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreSimple, economic and sensitive mathematical spectrophotometric methods were developed for the estimation 4-aminoantipyrine in presence of its acidic product. The estimation of binary mixture 4-aminoantipyrine and its acidic product was achieved by first derivative and second derivative spectrophotometric methods by applying zero-crossing at (valley 255.9nm and 234.5nm) for 4-aminoantipyrine and (peak 243.3 nm and 227.3nm) for acidic product. The value of coefficient of determination for the liner graphs were not less than 0.996 and the recovery percentage were found to be in the range from 96.555 to 102.160. Normal ratio spectrophotometric method 0DD was used 50 mg/l acidic product as a divisor and then measured at 299.9 nm with correlat
... Show MoreBiosurfactants have a wide-range of applications due to their unique properties like specificity, not toxicity (from LAB) and relative ease of preparation. These properties hold promise of biosurfactants to increase breast milk benefit were isolated and described into Lactobacillus plantarum, Lactobacillus fermentum ,Lactococcuslactis, and Leuconostocmesenteroides.The degree of microbial destruction of disease, which promotes the effective remediation of disease spreading.This paper presents a review of available research, methods and publications regarding Biosurfactant extraction from Lactic Acid bacteria isolated from human breast milk. 3 samples of human breast milk was provid
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
A thermal evaporation technique was used to prepare ZnO thin films. The samples were prepared with good quality onto a glass substrate and using Zn metal. The thickness varied from (100 to 300) ±10 nm. The structure and optical properties of the ZnO thin films were studied. The results of XRD spectra confirm that the thin films grown by this technique have hexagonal wurtzite, and also aproved that ZnO films have a polycrystalline structure. UV-Vis measurement, optical transmittance spectra, showed high transmission about 90% within visible and infrared range. The energy gap is found to be between 3.26 and 3.14e.V for 100 to 300 nm thickness respectivly. Atomic Force Microscope AFM (topographic image ) shows the grain size incre
... Show MoreThe complexes of Schiff base (6-[Hydroxy - benzylidene)-amino]-pyrimidine-2,4-diol ) (L) with Mn(II), Fe(II), Co(II) and Ni(II) were prepared. The Schiff base and complexes have been characterized by FT-IR, 1H-NMR, UV-Vis, LC-mass spectra, magnetic moment, elemental microanalyses (C.H.N.), chloride containing, atomic absorption and molar conductance.
The Schiff base, metal salts and complexes were also screened for their bioactivity such as antibacterial and antifungal.
A new chelating phenolic Schiff base containing phthalate imide pendant group resin was synthesized by three steps. The first step includes synthesis of 2-(4-aminobiphenyl-4-ylcarbamoyl) benzoic acid (1), Via reaction of pthalic anhydride with benzidine. In the second lines, the compound that we obtained in the first step was reacted with o-hydroxybenzaldehyde to obtain phenolic Schiff base 2-(4'-(2-hydroxybenzylideneamino) bephenyl-4-yl carbamoyl) benzoic acid (2) The third step includes prepared resin during intensification Schiff base derived with formaldehyde inan alkaline middle. Thepthale amice acid, Schiff base and resin were characterized by various instrumental techniques like FT-IR, 1HNMR ,13CNMR an
... Show MoreChronic renal disease (CRD) is a pathophysiologic process with multiple etiologies, resulting in the inexorable attrition of Nephron number and function and frequently leading to end-stage renal disease (ESRD). In turn, ESRD represents a clinical state or condition in which there has been an irreversible loss of endogenous renal function, of a degree sufficient to render the patient permanently dependent upon renal replacement therapy (dialysis of transplantation) in order to avoid life threatening uremia, reflecting a dysfunction of all organ systems as a result of untreated or under treated acute or chronic renal failure. The current study was involved 80 patients, the age range within 25-70 ye
... Show More