The objective of this study is to evaluate the bacterial count and heavy metal concentration of river water on fish micronuclei. Fish and water samples are carried out in 1 May to 1 June 2013 from Tigris River. A total of fifty three fish sample are studied. The bacteriological quality of water showed that the total viable count is ranged from 150×103 to 352×103 cfu/ml and fecal coliform counts was 1250 cell/100ml during the study period. All the metals (Cu, Hg, Pb, and Zn) are within the normal limit, but Cd was slightly elevated in river water samples. The appearance of micronuclei in red blood cells of all fish species is detect , by recording a larger number of it, in ( Abu Alsomere , Hishne , Bannini Kaber al fam & Karkoor ahmar) species compared with (Abu AL hakam , Nabbash , Kattan , Himri & Tela shami ) species. There is a difference in the percentages of the leukocytes types in different fish species, the highest percentage (12.3) of lymphocyte is recorded in Barbus xanthopterus and the lowest (1.5) is in Garra rufa
Phytophagous stink bugs (Hemiptera, Pentatomidae) are economically important insect pests of fruit, vegetable, nut and field crops. This study was carried out during the season of 2013 in orchards within Erbil city, to follow the stink bug Mustha spinulosa (Lefebvre, 1831) seasonal fluctuation on some fruit trees: olive, plum, apricot, pear, apple and almond.
The stink bug reaches its maximum abundance throughout the second week of August (38.2/tree) coinciding with mean temperature and relative humidity of 33.40C and 28.14% respectively, and the highest total mean of the number of the insect was recorded on the olive trees (181.8/tree). The study reveals that the stink bug attacked 22 trees (fruit and forest) while it has not atta
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreHypertension is identified as one of the most significant risk factors for cardiovascular diseases (CVDs). There is growing evidence showing that oxidative stress plays a major role in hypertension. Increased production of reactive oxygen species and decrease bioavailability of antioxidant have been demonstrated in experimental and human hypertension. The present study was directed to determine the beneficial effect of the antioxidant vitamin C in patients with essential hypertension treated with the calcium channel blocker (amlodipine) or with the angiotensin converting enzyme inhibitor (enalapril). Ninety six patients (50 females and 46 males) with essential hyp
... Show MoreBoth normally developed insects and insects developed after cessation of eggs growth were
used in this work. Cessation of eggs growth occurred following abnormal conditions, which
lasted for 3.5 months before developing into adults, due to the war led by the U.S. and her
alliances against Iraq. These insects showed low rates of water contents and an active response
to water loss. Therefore their tolerance of desiccation was weak. In addition, they had an active
ability to restore their water loss quickly, after return them to a culture, this indicates that some
changes occurred in their integumentary properties were not permanent and took their turn
within one population only, but may or may not serve this population
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units. This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized poros
... Show MoreAdsorption of Chlorophenol compounds in aqueous solution on Iraqi siliceouns rocks powder have been investigated. UV technique has been used to determine the adsorption isotherms. The results showed that the adsorption isotherms obeyed Freundlich adsorption equation. The adsorption was endothermic process, increasing temperature leads to increasing adsorption. H, S, G were calculated. The results showed that the adsorption increases with increasing acidity of solutions
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreBackground: Echocardiography has an important role to follow up patients with Iatrogenic atrial septaldefect (IASD) and after Catheter ablation during electro-physiological study.Objectives: evaluating the impact of non-invasive Transthoracic Echocardiography (TTE) parameters(LAVI, LVEF, ASD size and E/e`) post radiofrequency ablation of left atrial arrhythmia.Patients and methods: for the evaluation of the atrial septal defect, a transthoracic echocardiography(TTE) was used in patients who underwent left atrial arrhythmia ablation, enrolled in prospective studyin the Iraqi center for cardiac diseases, in cooperation with university of Baghdad /college of medicineResults: The outcomes of the present study were assessed according to
... Show MoreThis study delves into the realm of advanced cooling techniques by examining the performance of a two-stage parallel flow indirect evaporative cooling system enhanced with aspen pads in the challenging climate of Baghdad. The objective was to achieve average air dry bulb temperatures (43 oC) below the ambient wet bulb temperatures (24.95 oC) with an average relative humidity of 23%, aiming for unparalleled cooling efficiency. The research experiment was carried out in the urban environment of Baghdad, characterized by high temperature conditions. The investigation focused on the potential of the two-stage parallel flow setup, combined with the cooling capability of aspen pads, to surpass the limitat
... Show More