The liver is one of the most prominent glands in the digestive system. It crosses vital organs with multiple functions, including the secretion of enzymes, digestion of fats, and secretion of bile. Through histological studies and those interested in them, the tissue structure of the liver is of interest to researchers, and the four samples of Guinea pig Cavia porcellus were taken in this study to know the histological structure and compare it with rodents in particular. and other animals in general. The results of the liver parenchyma were comparable to those of the studied mammals in periods of hepatocytes, Kupffer cells, and sinusoids surrounding the central vein, blood supply, and bile ducts. He did not record differences, eve
... Show MoreDermatophytes are species with slight genetic variation, and are yet several uncertainties about the differences among species. This study aims to isolate and diagnose the Trichophyton interdigitale by molecular technique and to reveal the phylogenetic distance and similarity of the Iraqi isolates to other isolates from the globe, in addition, to submit the obtained sequences to the NCBI database. This study included 86 with multiple lesions on different parts of the body. The results showed different variations within the ITS gene between the isolates. It was concluded that Trichophyton interdigitale in Iraqi isolates had two types of substitution variations (Transition and Transversion) different than global isolates. Moreover, it
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreThis study was conducted to evaluate the bottled water quality for the six-producing companies in Baghdad city, where selected six brands which are the most marketed in the Iraqi market, especially in Baghdad, where taking the proper amount of bottled water in September 2015 and included the studied characteristics (EC , pH ,TDS, Turbidity, Ca+2, Mg+2, Cl-, No3-, So4-2, HCO3-, Na+ and K+) in addition to the total population of bacteria aerobic and coliform, and compare the results with the standard specifications of the Iraqi and the World Health Organization (WHO), as well as to compare the results of sampling specifications mentioned on the packaging by the producing companies. The results showed the presence of high significant differ
... Show More