Vitamins k is an important fat-soluble vitamin that can be obtained from plants, bacteria and animals and is necessary for the blood clotting. It plays a key function as a cofactor in the synthesizing of blood clotting proteins in the liver; recently, the interest for its functions in extra-hepatic tissue has increased. Vitamin k deficiency is usually caused by abnormal absorption rather than in the lack of vitamin in food. Apart from its impact on clotting, chronic subclinical deficiency of vitamin K maybe a risk factor for many diseases such as osteoporosis, atherosclerosis, cancer, insulin resistance, neurodegenerative diseases and others, while current food intake guidelines be focused on the daily dose necessary to avoid blood loss. Several researchers found out that vitamin K needs may be substantially higher for certain health functions.
In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreRecent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreAfter word war ll, the United States of America pursued a policy of containment aimed at preventing the Soviet Union from penetrating into the countries of the world, especially the regions of the Middle East, Therefore, it worked to emphasize the establishment of relations that include various political, economic and even cultural aspects, and focused its policy in his aspect on Turkey due to its geopolitical position. At a time when Turkey was undergoing developments at various levels and a change in govemment policy after the Demccratic Party came to power, which focused in its foreign policy on strengthening reltions with the West in general and the United States America in particular. The US government was the supporter of Democrat
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreEstimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The selection
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreImproving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreLocalization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algo
... Show More