Objective: The goal of this research was to evaluate where selenium nanoparticles impact the activity of antibodies in immunized lambs with foot and mouth vaccines by modulating the immune system. Materials and Methods: Two groups of lambs of 3–4 months of age were injected with 1 ml of ARRIAH-VAC vaccine intramuscularly in the neck, five Lambs were given selenium nanoparticles (size 100 nm) oral administration of selenium nano dose of 0.1 mg/kg of body mass once every day for sixty days considered as group one (G1) while the other five used as control Group 2 (G2). Results: This resulted in the establishment of an immune response, as evidenced by a rise in antibody titer in the blood using the ELISA test for three serotypes A,
... Show MoreAs a result of the exacerbation of the problem of water pollution, research was directed towards studying the treatment using ceramic membranes, which proved to be highly effective in treating all water sources. The research aims to study the possibility of preparing a new type of ceramic membranes from Syrian zeolite that was not previously used in this field. In this research, ceramic membranes were prepared from Syrian raw zeolite in several stages. Zeolite sample was characterized, grinded, mixed with boric acid, pressed to form desks, treated thermally according to experiment program, finally coated with silver nanoparticles. Specifications of prepared membranes were determined according to reference methods, effectiveness of prepar
... Show MoreIn this research, a novel synthesis of CaONPs has been developed via an environmentally friendly, green method. Garlic extract (Allium sativum) was used as a green-reducing and stabilizing agent for CaONPs. The average particle size of CaONPs was approximately 24.42 nm. The synthesized CaONPs were identified by using Fourier transform infrared (FT-IR) spectroscopy, U.V.-vis spectrum, X-ray diffraction (XRD), Field Emission-Scanning Electron Microscopy (FE-SEM), Transmission Electron Microscopy, transmission electron microscopy (TEM), Energy Dispersive X-ray spectroscopy (EDX), Atomic Force Microscopy (AFM), and zeta potential (Zp) analysis. The current study highlights the notable applications for CaONPs. First, an antimicrobial assay revea
... Show MoreAir pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant
A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreMany oil and gas processes, including oil recovery, oil transportation, and petroleum processing, are negatively impacted by the precipitation and deposition of asphaltene. Screening methods for determining the stability of asphaltenes in crude oil have been developed due to the high cost of remediating asphaltene deposition in crude oil production and processing. The colloidal instability index, the Asphaltene-resin ratio, the De Boer plot, and the modified colloidal instability index were used to predict the stability of asphaltene in crude oil in this study. The screening approaches were investigated in detail, as done for the experimental results obtained from them. The factors regulating the asphaltene precipitation are different fr
... Show MoreProblem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More