The Lamiaceae L. family grows and widely distributed in Iraq. The study aimed to enumerate the species that has been preserved in several botanical herbariums: National Herbarium of Iraq- Ministry of Agriculture (BAG), University of Baghdad Herbarium (BUH), Iraq Natural History Research Center& Museum- University of Baghdad Herbarium (BUNH), College of Agricultural Engineering- University of Baghdad Herbarium (BUG), College of Agricultural Engineering Sciences- Duhok Province University Herbarium (DPUH) and College of Science - Salahddin University Herbarium (SUH). This family has not yet been registered in the Flora of Iraq. After examining more than 1000 herbarium specimens, the study found 139 species belonging to 33 genera h
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Iraqi legislator taxation married women in charge of the income tax treatment of the man in charge of tax and the application of the principle of equality of individuals to bear public burdens. The factor legislator women in charge of special treatment in some cases, taking into account the circumstances family allow tax in the case of whether she was married to a man is unable to completely work and does not have a resource, as well as giving the legislator allow for her children. it observed that the amount of allowing still little is notcommensurate with the high cost of living in addition to limiting the tax allowances granted within the limits of the taxpayer and his immediate family did not take the legisla
... Show MoreThe aim of this paper is to identify Nano-particles that have been used in diagnosis and treatment of leishmaniasis in Iraq. All experiments conducted in this field were based on the following nanoparticles: gold nanoparticles, silver nanoparticles, zinc nanoparticles, and sodium chloride nanoparticles. Most of these experiments were reviewed in terms of differences in the concentrations of nanoparticles and the method that was used in the experiments whether it was in vivo or in vitro. These particles used in most experiments succeeded in inhibiting the growth of Leishmania parasites.
The aim of this paper is to determine the significant levels of some heavy metals such: lead, chromium, nickel and cadmium, were determined. Sources of pollution and their distribution according to presence of elements in the soils over the whole zone of the province of Maysan in southern of Iraq were investigated 36 soil samples from different zones: residential, industrial, commercial, agricultural and main roads, were collected from the soil surface and a depth of 30 cm and analyzed measuring of concentrations for heavy metals by a device ICP-MS technique. The results were compared with global standard levels of these elements in the soil.
Cosmetic products must be safe for use by consumers , It is also regulated and required the legislation of countries all over the world . In this study out of 80 cosmetic products analyzed and 32.5% were found to be contaminated .Products such as mascara, lip pencil and eye pencil were analyzed . The contaminants including bacteria such as Staphylococcus aureus , Staphylocoocus epidermidis , Pseudomonas aeruginosa , Escherichia coli and Klebsiella pneumonia which were ranging in number from (103-104 ) C.F.U. /ml and fungi such as Penicillium spp. , <
... Show More