Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Standard Precipitation Index (SPI), Standard Evapotranspiration Index (SPEI), and Palmer Index (PI). According to the researchers in hydrology and for the most accurate description of the drought, more than one indicator for drought should be used. Most reviewed studies recommended using the Standard Precipitation Index (SPI) as the best indicator to describe the drought.
Genetics play a major role in diabetic retinopathy DR, which is a leading cause of blindness worldwide. Although the factors such as how long a person has had diabetes and high blood sugar are important, the wide variation and progression of DR indicates to a clear genetic influence. Early studies focusing on a few candidate genes (such as VEGF) produced conflicting and population-dependent results. This confirmed the multifactorial nature of the disease and the limitations of small-scale studies. Conversely, genome wide association studies (GWAS) have provided more consistent findings in detection a new genes related to DR. For example, rs2239785 variant which is located in the APOL1 gene was found to be a high risk factor for diabetic mac
... Show MoreThe rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Background: Bladder cancer (BC) is the most common malignant tumor in the urinary tract and the tenth most common malignancy worldwide. Exosomes are 40–100 nm-diameter nanovesicles that are either released straight from the plasma membrane during budding or merged with the plasma membrane by multivesicular bodies. Objectives: To assess the proportion of serum and urinary Exosome levels in urinary bladder cancer patients, as well as their impact on the disease. Methods: From January 2023 to June 2023, a total of 45 samples of blood and urine were collected from individuals diagnosed with bladder cancer at the Ghazi Hariri Hospital for Specialized Surgery. They included 45 male and female patients, varying in age, as well as 45 heal
... Show MoreA total of 20 raw milk samples were used as the fouling agent for evaluating the bacteriological effectiveness of cleaning and sanitizing of domestic milking equipment by using ozonated water at 0.5 ppm comparing to the warm water at 55! for 5 minutes respectively. The mean values of total aerobic bacteria, Coliform and E.coli that present on the plastic and stainless-steel containers after using the raw milk as fouling agent were 3.4×10-6 , 6.7x10-5 and 5.8×10-3 cfu/cm2 respectively , after cleaning the stainless steel containers by the ozonated water the mean values of total aerobic bacterial counts, Coliforms and E.coli bacteria were reduced to 1.2×10-6, 4.7×10-5 and 3.3×10-3 CFU/cm2 respectively. while after cleaning by the warm wa
... Show MoreThis paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreB Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2