The levels of lead (pb), copper (cu), cobalt (co) and cadmium (cd) were determined in different kinds of milk and the health risks were evaluated. The mean levels were 0.73±0.21, 0.06±0.01, 0.12±0.01 and 0.14±0.01 ppm for these metals respectively. The levels of pb and cu were found to be insignificant differences (p<0.05), whereas the levels of co and cd, were no significant differences (p>0.05). The dry and liquid kinds of milk were different significantly (p<0.05), whereas the original, was no significant differences (p>0.05). The values for all metals were more than one. The metals pb and cd were detected at highest concentrations in most dry and liquid milk samples.
The research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev
... Show MoreGraphene oxide (GO) was prepared from graphite (GT) with Hammer method, the GO was reduced with hydrazine hydrate to produce a reduced graphene oxide (RGO). The RGO was reacted with thiocarbohydrazide (TCH) to functionalize the RGO with 4-amino-3-symbol-1h-1, 2, 4-triazol-5 (4H) –thion group and to obtain (RGOT). All the prepared nanomaterial and the product of the functionalization RGOT were characterized with Fourier transformer infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) analysis. RGOT mixed with ultrasonic device at different pH values of phosphate buffer solution (PBS), the mixture used to modifying a screen printed carbon electrodes SPCE and with cyclic voltammetry the sensitivity of selectivity of the new modifying elect
... Show MoreBegomoviruses infecting zucchini squash were investigated. Leaf samples were collected from zucchini squash growing areas in Baghdad (Jhadryaa and Yusufiyah), Babylon (Jibela and Mahmudiyah) and Diyala (Khan Bani Saad) Provinces. Samples were screened for the presence of begomoviruses using polymerase chain reaction (PCR) and Deng genus specific primers. Sixteen out of 40 samples were begomovirus positive. Sequence analysis confirmed the detection of Tomato leaf curl Palampur virus (TLCPALV)
Calendula officinalis L. (Asteraceae) known as marigold is known to have several pharmacological activities and used for the treatment of several diseases as measles, jaundice, constipation and several inflammations. Marigold flowers contain several chemical constituents mainly flavonoids, triterpenoids and essential oil. In this study marigold flowers cultivated in Iraq had been investigated for its flavonoids content. The study revealed the presence of quercetin and kaempferol glycosides and the absence of myricetin glycosides. The flowers were extracted with ethanol 70% fractionated with different solvent and the flavonoids were isolated by preparative HPLC. The isolated flavonoids were identified by measuring melting points, UV, IR,
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThe main problem established by a discovery of a thyroid nodule is to discriminate between a benign and malignant lesion. Differential diagnosis between follicular thyroid cancer (FTC) and benign follicular thyroid adenoma (FTA) is a great challenge for even an experienced pathologist and requires special effort. A developing number of some encouraging IHC markers for the differential diagnosis of thyroid lesions have emerged, including, Hector Battifora mesothelial (HBME-1) and galectin-3 (Gal-3). There was significant positive correlation between Galectin-3 and HBME-1 in follicular carcinoma and follicular variant of papillary carcinoma (r= 0.380, P= 0.041) and (r= 0.315, P=0.047) respectively. There was no significant correlation between
... Show MoreThis study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More