The objective of this study is to evaluate the bacterial count and heavy metal concentration of river water on fish micronuclei. Fish and water samples are carried out in 1 May to 1 June 2013 from Tigris River. A total of fifty three fish sample are studied. The bacteriological quality of water showed that the total viable count is ranged from 150×103 to 352×103 cfu/ml and fecal coliform counts was 1250 cell/100ml during the study period. All the metals (Cu, Hg, Pb, and Zn) are within the normal limit, but Cd was slightly elevated in river water samples. The appearance of micronuclei in red blood cells of all fish species is detect , by recording a larger number of it, in ( Abu Alsomere , Hishne , Bannini Kaber al fam & Karkoor ahmar) species compared with (Abu AL hakam , Nabbash , Kattan , Himri & Tela shami ) species. There is a difference in the percentages of the leukocytes types in different fish species, the highest percentage (12.3) of lymphocyte is recorded in Barbus xanthopterus and the lowest (1.5) is in Garra rufa
The research aims at the scholars’attention to the importance and role of Arab Muslim women through books and historical studies that historians and scholars have taken up like Ibn Al-Jawzi (597 AH) and his book Safwat Al-Safwa, where he presented the conduct of worship and their words and deeds, and explained to women worshipers other aspects of their lives, such as the scientific aspect Crafts and works as well as their prominent role in preaching and religious guidance, and the impact of this on their morals and qualities. This study showed the strength of the personality of women and their high interest in worship. The importance of the study lies in knowledge.The research followed the role of Muslim women to carry t
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreGlutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
Four major factories (Petroleum Refineries Company, Detergents Plant, Thermal Power Plant, and Gaseous Power Plant) are located to the north of Baiji City. They release pollutants in form of gases, liquids and solids; they find their way to the surrounding environment. To assess the environmental pollution of the area, 18 samples of surface soil distributed around the industrial establishments were collected and analyzed to determine the concentration of polycyclic aromatic hydrocarbons (PAH) components which are often targets in the environmental checking. Identification and quantification of the 16 PAHs components was accomplished using High Performance Liquid Chromatography (HPLC) had a model Shimadzu LC-10 AVP. The total concentratio
... Show More