Smoking-related diseases can be attributed to the inhalation of many different toxins, including heavy metals, which have a host of harmful health effects. The primary objective of this study was to determine whether local and imported cigarette brands used in Iraq , have they elevated levels of metals or not .Three metals Lead (Pb) , Cadmium (Cd) and Chromium(Cr) were determined in tobacco of seventeen brands of imported cigarettes commonly available in Iraq and three Iraqi domestic cigarettes , which were randomly taken from retail market in Baghdad by using flame atomic absorption spectrometry. The produced data of imported and local cigarette brands were discussed and compared together and with studies from elsewhere .The results obtained showed that mean concentrations of lead for all cigarette brands was 5.87 ?g/g dry weight (range 2.27-11,67 ?g/g) , cadmium 0.57?g/g dry weight (range 0.1-1.57 ?g/g) and chromium 3.77?g/g dry weight (range 0.0-11.21 ?g/g) ..There was a large variability in Pb, Cd and Cr content of samples of cigarettes. Pb concentration was the highest, followed by Cr while Cd was the lowest. The investigation confirmed that most of the Iraqi and imported cigarettes in Iraq are contaminated with Pb, Cd, and Cr and quantitatively their distribution is clearly above the safer limits of WHO.
This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
Die Forschung geht um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreAn annular two-phase, steady and unsteady, flow model in which a conductingfluid flow under the action of magnetic field is concavely. Two models arepresented, in the model one; the magnetic field is perpendicular to the long side ofthe channel, while in the model two is perpendicular to the short side. Also, westudy, to some extent the single-phase liquid flow.It is found that the motion and heat transfer equations are controlled by differentdimensionless parameters namely, Reynolds, Hartmann, Prandtl, and Poiseuilleparameters. The Laplace transform technique is used to solve each of the motion andheat transfer equations. The effects of each of dimensionless parameters upon thevelocity and heat transfer is analyzed.A comprehensive study fo
... Show MoreEprospective study undertaken between January 2007 and January 2011, 58 consecutive cases with compound tibial shaft fractures. All fractures were stabilized by external fixator device AO/ASIF type after failed the manipulation under anesthesia (MUA) to restore the osseous alignment. In 32 patients cancellous bone graft were used from the upper part of the tibia to enhance healing process, all these patients were followed for an average of 8–12 months. Our findings showed that stabilization of the fracture shaft tibia by external fixation with cancellous bone graft had significantly better result, than external fixation alone. We conclude that unilateral, uniplanar external fixation with early bone grafting from upper part of the tibia is
... Show MoreBackground: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show More