Metal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.53 for Li, 860-14330 for Mg, 16.20-71.5 for Mn, 612-4725 for Na and 15.8-46 µg g-1 for Zn. The results revealed that the concentration of Al, B except in Syrian mesquite, Ba, Ca, Fe, K, Mg and Mn in all analysed vegetables is higher than the recommended value, Li is well-within the safe limit, and Co, Na except in dill, arugula and common purslane, Zn are lower than the recommended intake of these elements. From health point of view, the HQ values for Al, Fe (for all vegetables) and Ba (in dill, vine leaves, thymes, arugula, basil, common purslane and parsley) were higher than one, indicating potential non-cancer health risk due to exposure to these metals. Furthermore, the HI value for all vegetables was higher than one, indicating potential non-cancer health risk due to long-term exposure to these metals.
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
The voice lesson inherited from the sound explanation of the phenomenon of the realization of Hamza or ease, but an explanation based on the description of the phenomenon rather than research in the voice relations that govern the emergence of the investigation or mitigation, and this is contrary to the lesson of modern voice what the applicants in this regard. This research reveals the differences between the ancients and modernists in the vocal explanation of a variety of patterns of the phenomenon of the realization of Hamza. And the many issues of Hamza realized or diluted we stand in our research when the voice explanation for one of them is to achieve the Hamzah Almtalp of the millennium, and this heart acknowledged by the ancients
... Show MoreA simple and accurate method to determinate furosemide (FUR) based on converting the secondary amine to primary amine with acidic hydrolysis then azotization by nitrous acid and coupled with resorcinol as a coupling agent in aqueous medium at pH 13. The optical characteristic like beers law limit found to be (0.25-2.5) μg.ml−1, detection and quantification limits (0.0196) (0.0654) μg.ml−1respectivly and Sandel sensitivity was 0.006738 μg.cm−2. The least-square method was used to evaluate the regression equation and the correlation coefficient. The resulted azo dye has a maximum absorbance at 430 nm with light oran
Thirteen isolates were collected from various clinical sources during the periodfrom 22/10/2017 to 22/12/2017. All the isolates were diagnosed based on the microscopic and biochemical propertiesby Vitek-2 Compact system. All isolates formed biofilm 100%, with 30% of isolatesbiofilm produced strongly and 70% on medium. The results of the present study have shown the presence of Curli fimbriae genes in E. cloacae bacteria from cases of urinary tract infections, infected patient with blood bacteremia and inflammation of wounds. Curli fimbriae is considered to be an important factor in the virulence of E.cloacae bacteria, which plays an important role in adhering and combining cells on solid surfaces to form the biofilmand helps in the adhesion
... Show MoreChemical bath deposition was used to synthesize ZnO nanorods (NRs) on glass and fluorine_doped tin oxide (FTO) substrates. X-ray diffraction was performed to examine the crystallinity of ZnO nanorod. Results showed that ZnO NRs had a wurtzite crystal structure. Field emission scanning electron microscopy images showed that glass sample had rod-like structure distribution with (50 nm) diameter and average length of approximately (700 nm), whereas the FTO-coated glass sample had 25 nm diameter and average length of approximately 950 nm. The direct optical transition band gaps of the glass and FTO_coated glass samples were( 4 and 4.43 eV), respectively. The structural and optical properties of the synthesized ZnO p
... Show MoreThat the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:
Queuing theory _ Graphical Evaluation and Review Technique
Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulatio
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreA content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More