A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the
... Show MoreA total of 28 birds were examined to investigate about the distribution of the nematode Hadjelia truncata among some members of the avian family Columbidae in Al-Diwaniya Province, Central Iraq. The percentages of the infection rate with this nematode were 27.27, 37.5, 14.28 and 0 in Columba livia, C. palumbis, Streptopelia decaocto, and S. turtur respectively. Reporting Hadjelia truncata from Streptopelia decaocto constitutes a new host record.
This contribution reports a comprehensive investigation into the structural, electronic and thermal properties of bulk and surface terbium dioxide (TbO2); a material that enjoys wide spectra of catalytic and optical applications. Our calculated lattice dimension of 5.36 Å agrees well with the corresponding experimental value at 5.22 Å. Density of states configuration of the bulk structure exhibits a semiconducting nature. Thermo-mechanical properties of bulk TbO2 were obtained based on the quasi-harmonic approximation formalism. Heat capacities, thermal expansions and bulk modulus of the bulk TbO2 were obtained under a wide range of temperatures and pressures. The dependency of these properties on operational pressure is very evident. Cle
... Show MoreThis work aimed to use conventional PCR to identify Salmonella spp. that were isolated from diarrheal children and healthy and diarrheic dogs based on four virulence genes, hilA, stn, spvR, and marT. Sixteen Salmonella isolates including: 9 isolated from children's diarrhea from three species (S. Typhimurium, S. Enteritidis, S. Typhi) and seven isolated from dogs including (S. Typhimurium, S. Enteritidis, S. Muenchen), were identified primarily by several methods. The PCR products of the 16S rRNA gene were sequenced and examined using BLAST analysis to find differences and similarities between these Iraqi isolates and already-known global strains in order to construct the phylogenetic tree of S.
... Show MoreMishrif Formation is the main reservoir in oil-fields (North Rumaila, South Rumaila, Majnoon, Zubair and West Qurna) which located at Basrah southern Iraq. The Inductively coupled plasma-Mass spectrometer (ICP-MS) was used for the water chemistry analysis and Scanning Electron Microprobe (SEM) for the purpose of mineralogy diagnosis. A weak acidic water of salinity six-time greater than seawater plays a role in generating the formation pressure and controlling the fluid flow. The potentiometric subsurface maps were modeled and the direction of super-pressure sites that are of a great importance in the oil exploration were marked to pay attention during future drilling.
Al2O3 and Al2O3–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result w
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Prevention against nosocomial infection is an important issue of health care field and considered a challenge of patients’ since it reflects its effect on their quality of life. This due to that it will lead in most cases to prolonged hospitalization and also more cost.Objective: To determine the prevalence of different types of nosocomial infection and to demonstrate the association of different risk factors (hospital environment, workers, visitors) with nosocomial infection.Patients: this study was carried out in eleven months at Ba’quba general Hospital; Iraq. A total of 81 clinical specimens (urine, pus from abscess , burn swab, nasal swab, ear swab and wound swab) taken from surgical patients,102 specimens from
... Show MoreIraqi insurance market need to develop products and to find new insurance policies to cover the damages of the violence and political commotions dangers and to meet the needs of the proposers.
The global insurance companies recently issued such policies to pay the losses wich caused by the violent political acts of vandalism suffered by the property and investments wich estimated billions of dollars.
... Show More