Although rare, coarctation of aorta is a treatable cause of hypertension, transcatheter dilatation by balloon with or without stent are a well-known treatment strategy
Removal of solar brown and direct black dyes by coagulation with two aluminum based
coagulants was conducted. The main objective is to examine the efficiency of these
coagulants in the treatment of dye polluted water discharged from Al-Kadhymia Textile
Company (Baghdad-Iraq). The performance of these coagulants was investigated through
jar test by comparing dye percent removal at different wastewater pH, coagulant dose,
and initial dye concentration. Results show that alum works better than PAC under acidic
media (5-6) and PAC works better under basic media (7-8) in the removal of both solar
brown and direct black dyes. Higher doses of PAC were required to achieve the
maximum removal efficiency under optimum pH co
Recently, it has been revealed that Toxoplasmosis may be associated with some factors related to type 2 diabetes, such as glucose, insulin, the Homeostatic Model Assessment for Insulin Resistant (HOMA-IR), and Fatty acid binding protein (FABP). Therefore, the current study aimed to specify how Toxoplasma gondii (T.gondii) infection affects glucose, insulin, HOMA-IR, and FABP among adolescents. From October to December 2022, this study was carried out at Al Madain Hospital in Baghdad. For a group of adolescents visiting the hospital, an ELISA test was performed to check their anti-T.gondii antibodies. Ninety adolescents were selected to participate in the study on the basis of this examination. They were divided into two groups: those who te
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreGaslift reactors are employed in several bioapplications due to their characteristics of cost-effectiveness and high efficiency. However, the nutrient and thermal gradient is one of the obstacles that stand in the way of its widespread use in biological applications. The diagnosis, analysis, and tracking of fluid paths in external draft tube gaslift bioreactor-type are the main topics of the current study. Several parameters were considered to assess the mixing efficiency such as downcomer-to-rizer diameter ratio (Ded/Dr), the position of the diffuser to the height of bioreactor ratio (Pd/Lr), and gas bubble size (Db). The multiple regression of liquid velocity indicates the optimal setting: Ded/Dr is (0.5), Pd/Lr is (0.02), and Db
... Show MoreReceipt date:9/1/2020 accepted date:11/24/2020 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
the Nile River and the Renaissance Dam is one of the most prominent factors that had an important role in the nature of relations between Egypt - Ethiopia, as they contributed to building a relationship that has common characteristics through the nature of the i
... Show MoreThis work presents an investigation on the fabrication and characterization of Fe doped zeolitic imidazolate framework (ZIF-8) of 1:1 M ratio of Zn:Fe (Fe/Zn-ZIF-8) and adsorption performances of acquired materials. The synthesized Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 materials were characterized for the phase structure, morphology, elemental analysis and surface area by using X-ray diffraction (XRD), Field emission scanning electron microscope (FESEM), Energy Dispersive X-Ray (EDX), and BET surface area, respectively. The results revealed the adsorption capacity was enhanced by incorporation of Fe into ZIF-8 structure. The CR dye adsorption capacities were 287, 219, and 412 mg/g for Zn-ZIF-8, Fe-ZIF-8, and Fe/Zn-ZIF-8 adsorbers, respectivel
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More