The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o
... Show MoreThe high mobility group A1 gene (HMGA1) rs139876191 variant has been related to metabolic syndrome and type 2 diabetes, but data are lacking in Middle Eastern populations. The study aimed to assess whether the HMGA1 rs139876191 variant is associated with metabolic syndrome risk and whether this variant predicts the risk of insulin resistance. This case-control study was carried out at single center in Kirkuk city/ Iraq from February to August 2022. Polymorphisms in HMGA1 and genotyping were identified by Sanger sequencing of genomic DNA obtained from 91 Iraqi participants (61 patients with metabolic syndrome and 30 control). Lipid profile, serum (glucose and insulin), glycated hemoglobin, blood pressure, body mass index, and waist circumfer
... Show MoreA recent study compared experimentally the hydraulic and thermal activity of twisted tape inserts for two types, metal foam twisted tape (MFTT) and traditional twisted tape (TTT), in a double pipe heat exchanger. The investigation goal of the innovatively designed MFTT is to enhance the heat transfer process, which provides a higher thermal enhancement factor over those of TTT under the same conditions. Heat transfer activity in terms of Nusselt number (
Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreMethotrexate (MTX), a folic acid antagonist is widely used for the treatment of a variety of tumors. In the present study, the possible protective effect of aqueous green tea extract (AGTE) in methotrexate-induced haematotoxicity was investigated.Four main groups of white Albino rats were used: control group, (MTX) group, following a single dose of MTX (20 mg/kg, i.p.) saline was administered for 5 days. (AGTE) group, was treated with 1.25% concentration of AGTE only for 12 days and the (MTX+AGTE) group, in thism group rats received different concentrations of AGTE (0.625, 1.25 and 2.5%), as their sole source of drinking water, 7days before and 5 days after MTX treatment. MTX induced significant decreases in RBC, Hb, Hct, WBC and pl
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreNear surface mounted (NSM) carbon fibers reinforced polymer (CFRP) reinforcement is one of the techniques for reinforcing masonry structures and is considered to provide significant advantages. This paper is composed of two parts. The first part presents the experimental study of brick masonry walls reinforced with NSM CFRP strips under combined shear-compression loads. Masonry walls have been tested under vertical compression, with different bed joint orientations 90° and 45° relative to the loading direction. Different reinforcement orientations were used including vertical, horizontal, and a combination of both sides of the wall. The second part of this paper comprises a numerical analysis of unreinforced brick masonry (URM) wa
... Show MoreThe problem in the design of a cam is the analyzing of the mechanisms and dynamic forces that effect on the family of parametric polynomials for describing the motion curve. In present method, two ways have been taken for optimization of the cam size, first the high dynamic loading (such that impact and elastic stress waves propagation) from marine machine tool which translate by the roller follower to the cam surface and varies with time causes large contact loads and second it must include the factors of kinematics features including the acceleration, velocity, boundary condition and the unsymmetrical curvature of the cam profile for the motion curve.
In the theoretical solution
... Show More
