The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.
Background: The association between diabetes and inflammatory dental diseases had been studied extensively for more than 50 years. A large evidence base suggests that diabetes is associated with an increased prevalence, extent and severity of gingivitis and periodontitis and loss of teeth. Many patients do not aware that they are diabetic.Objectives:The aim of the current study was to assess a fast, non-invasive, safe procedure to screen for diabetes and its severity in dental clinics and to assess the change in blood glucose level before and after tooth extraction during periodontalResults: there were no significant differences between the blood samples collected before tooth extraction from finger puncture method (FPB) and the gingival
... Show MoreThe present study was conducted to estimate the incidence, clinical findings, cytological and histopathological characteristics of spontaneously occurring skin neoplasms in dogs. A total of 40 grossly suspected cases of cutaneous and subcutaneous tumors were gathered during the period from July 2016 to August 2018 from male and female dogs in Baghdad city. Dogs with skin neoplasia revealed various clinical signs, and their ages were older than 5 years to 15 years. German shepherd 30% followed by Terrier dogs 25% were more influenced than other breeds. Concerning tumor features, the majority of neoplasms had solitary lesion 70%, regular shapes 65% with black color 55%. The tumors frequently occurred on fore-limbs and abdomen, and 80% of them
... Show MoreThe current work is characterized by simplicity, accuracy and high sensitivity Dispersive liquid - Liquid Micro Extraction (DLLME). The method was developed to determine Telmesartan (TEL) and Irbesartan (IRB) in the standard and pharmaceutical composition. Telmesartan and Irbesartan are separated prior to treatment with Eriochrom black T as a reagent and formation ion pair reaction dye. The analytical results of DLLME method for linearity range (0.2- 6.0) mg /L for both drugs, molar absorptivity were (1.67 × 105- 5.6 × 105) L/ mole. cm, limit of detection were (0.0242and0.0238), Limit of quantification were (0.0821and0.0711), the Distribution coefficient were
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe paper deals with a study of peculiarities of gluttonic text structures in the Arabic-Russian language pair at the sociolinguistic, system structural, functional-stylistic and lexico-semantic aspects from the standpoint of view at functional approach to the phenomena of language systems and the gluttonic discourse as a special type of ver bal and social discourse. Profound attention is paid to the consideration of lexical and grammatical means of explication of glutton discourse on the examples of identi cal Arabic and Russian literary texts as well as language situations in Arab countries and Russia, features of which are due to the characteristics of gluttonic discourses that reflect the features of the two different ethnolingual cu
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More