A group of acceptance sampling to testing the products was designed when the life time of an item follows a log-logistics distribution. The minimum number of groups (k) required for a given group size and acceptance number is determined when various values of Consumer’s Risk and test termination time are specified. All the results about these sampling plan and probability of acceptance were explained with tables.
In this work, silver (Ag) self-metallization on a polyimide (PI) film was prepared through autocatalytic plating. PI films were prepared through the solution casting method, followed by etching with potassium hydroxide (KOH) solution, sensitization with tin chloride (SnCl2), and the use of palladium chloride (PdCl2) to activate the surface of PI. Energy-dispersive X-ray analysis (EDX) showed the highest peak in the (Ag) region and confirmed the presence of AgNPs. The diffraction peaks at 2θ = 38.2°, 44.5°, 64.6°, and 78.2° represented the 111, 200, 220, and 311 planes of Ag, respectively. The FT–IR an
... Show MoreThe recent studies suggested the possible toxicities or genetic alterations associated with biological and medical applications of silver nanoparticles (AgNPs). The current research is directed to see if AgNPs administration can lead to some changes in expression of BRAF gene in selected body organs tissues. Fifty-six male of musmusculs (Balb/C) mice from the animal house of Al-Nahrain Centre of Biotechnology were used. These animals were divided randomly to seven groups (eight mouse in each group), one of these groups represented the control group, three groups were subjected to different doses of AgNPs (0.25, 0.5and 1 mg/kg of body weight) for one week, and the remaining three groups were subjected to three different doses of AgNP
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreImam Muslim bin Qasim al-Qurtubi And his efforts in wound and modification
Pseudomonas aeruginosa has been identified as the main causative agent responsible for severe infections in burn patients worldwide. This study aimed to investigate the prevalence of the exoU/exoS genotype in P. aeruginosa isolates collected from burn wound infections in Iraq. From January to April 2023, a total of eighty isolates of P. aeruginosawere obtained from patients with burn wound infections in two Iraqi hospitals (Teaching Baghdad Hospital and AL-Yarmok Hospital).The isolates were first identified using biochemical tests and then verified using molecular techniques, specifically by targeting the 16S rRNA gene with specific primers. The exoU/exoS genotype was detected using conventional polymerase chain reaction (PCR) by specifical
... Show More