In recent years, there has been a rise in interest in the study of antibiotic occurrence in the aquatic environment due to the negative consequences of prolonged exposure and the potential for bacterial antibiotic resistance. Most antibiotic residues from treated wastewater end up in the aquatic environment as they are not eliminated in facilities that treat wastewater. Antibiotics must be identified in influent and effluent wastewater using reliable analytical techniques for several reasons. Firstly, monitoring antibiotic presence in aquatic environments. Secondly, assessing environmental risks, computing wastewater treatment plant removal efficiencies, and estimating antibiotic consumption. Therefore, this work aims to provide an overview of existing approaches for determining antibiotics in complicated matrices including wastewater. Because it is currently the most effective and often used analytical method for determining antibiotic residue, liquid chromatography linked to tandem mass spectrometry was chosen.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe research aims to highlight on the reasons of financial & managerial corruption phenomena and to suggest systems & methods that promote controlling and developing the mechanism to combat corruption it also highlights on the ways that should available to enable the three regulatory agencies to reduce this phenomenon. The research depends on the following hypothesis "the governance of state institutions and the application of electronic government with depending on a correct mechanism to crossing auditing and the equilibrium performance model well help to reduce corruption phenomenon in Iraq" the two researchers have been concluded some conclusions the main one is that so many reasons of corruption starting from the bad
... Show MoreThe researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.
In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.
The electrical activity of the heart and the electrocardiogram (ECG) signal are fundamentally related. In the study that has been published, the ECG signal has been examined and used for a number of applications. The monitoring of heart rate and the analysis of heart rhythm patterns, the detection and diagnosis of cardiac diseases, the identification of emotional states, and the use of biometric identification methods are a few examples of applications in the field. Several various phases may be involved in the analysis of electrocardiogram (ECG) data, depending on the type of study being done. Preprocessing, feature extraction, feature selection, feature modification, and classification are frequently included in these stages. Ever
... Show MoreEnvironmental pollution is regarded as a major problem, and traditional strategies such as chemical or physical remediation are not sufficient to overcome the problems of pollution. Petroleum-contaminated soil results in ecological problems, representing a danger to human health. Bioremediation has received remarkable attention, and it is a procedure that uses a biological agent to remove toxic waste from contaminated soil. This approach is easy to handle, inexpensive, and environmentally friendly; its results are highly satisfactory. Bioremediation is a biodegradation process in which the organic contaminants are completely mineralized to inorganic compounds, carbon dioxide, and water. This review discusses the bioremediation of petroleum-
... Show MoreTitanium dioxide TiO2 has been widely utilized in cleaning and sterilizing material for many clinical tools sanitary ware, food tableware and cooking and items for use in hospitals. Titanium dioxide TiO2 non toxicity and long term physical and chemical stability. It has been widely used decomposition of organic compounds and microbial organisms such as cancer cell, viruses and bacteria as well as its potential application in sterilization of medical devices. The aim of the study the effect of titanium dioxide TiO2 on some Gram negative bacteria and study their effects on some virulence factors and chromosomal DNA.In this study, we obtained (E. coli ? Proteus mirabilis, Proteus vulgaris ? Pseudomonas aeruginosa ? Klebsiella pneumonia and Ac
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis research deals with the most important indicators used to measure the phenomenon of financial depth, beyond the traditional indicators, which are called quantitative indicators, which is shown to be inadequate to show the facts accurately, but it may come in the results of a counterfactual, although reliable in econometric studies done in this regard.
Therefore, this research has sought to put forward alternative indicators, is the structural indicators, and financial prices, and availability of financial instruments, and cost of transactions concluded, in order to measure the phenomenon of financial depth.
After using and analyzing data collected from countries the research
... Show More