The aim of the present study is to estimate the levels of some essential and non-essential metals content of soil and seven leafy vegetable species, in the field 30m away from the Al-Qanat highway in Baghdad using X-ray fluorescence analysis. The results showed that soil and leafy vegetables had higher levels of macro elements, and that Ca in rocket and purslane was the highest. The average content of trace elements in soil and leafy vegetables has been close to the minimum than the range of permissible limits recommended by WHO and FAO/WHO except Fe, Cr and Ni in soil have exceeded the concentration of the threshold limit (13728.8 mg/kg Dw for Fe, 183.361mg/kg Dw for Cr, and 124.01mg/kg Dw for Ni) value as well for leafy vege
... Show MoreThree hundred and sixty different samples were collected from different sources, including wound, burn, nasal, and oral swabs from several hospitals in Baghdad. A number of 150 (53%) Staphylococcus aureus samples were isolated and identified among a total of 283 samples. Then, the spread of the Toxic Shock Syndrome Toxin-1 gene (tsst-1) was investigated in β-lactamase resistant S. aureus. According to the source of samples, the distribution of S. aureus isolates was found to be significantly higher (p < 0.01) in wound samples as compared to other sources. According to the age, a highly significant distribution (p < 0.01) was recorded in the age group of 15-30 years,
... Show MoreThis study observed the formation of struvite crystals in wastewater using natural zeolite activated with Mg2+ ions. Mg2+ ions released from natural zeolite would react with PO43- and NH4+ ions from in wastewater to form struvite crystals. The results showed that at pH 8.5, the removal of PO43- and NH4+ ions was more effective using the modified zeolite than the natural zeolite. Adding 40 g/L Zeo-Mg (1) produced the best results, with PO43- (93.32%) and NH4 (40%) adsorption. Meanwhile, 40g/L Zeo-Mg (2) adsorbed 81% PO43- ions and 27.12% NH4+ ions. The eqil
... Show MoreThe aim of this article is to present the exact analytical solution for models as system of (2+1) dimensional PDEs by using a reliable manner based on combined LA-transform with decomposition technique and the results have shown a high-precision, smooth and speed convergence to the exact solution compared with other classic methods. The suggested approach does not need any discretization of the domain or presents assumptions or neglect for a small parameter in the problem and does not need to convert the nonlinear terms into linear ones. The convergence of series solution has been shown with two illustrated examples such (2+1)D- Burger's system and (2+1)D- Boiti-Leon-Pempinelli (BLP) system.
The Water Quality Index (WQI) is an important parameter in describing the water resources' suitability for human uses and is one of the most effective methods of describing water quality and indicative of assessing water quality and suitability for human utilization and the health of ecosystems. WQI of the Canadian Council of Ministers of the Environment (CCME) was used in the study to describe the Shatt al-Arab water quality in Basrah Southern Iraq, and its suitability for drinking use. The data for analyzing river water samples were adopted from five stations along the river every month during the years from 2014 to 2018 by the Iraqi Ministry of Environment, as it included the measurement of acidity function PH, Dissolved Oxyg
... Show MoreBone metastases are the main reason for death in males suffering from advanced prostate cancer. This study aimed to create zoledronic acid and graphene oxide conjugation for anticancer therapy. The process of conjugation was confirmed by several characterization methods including UV-VIS spectrophotometry, Fourier Transform Infrared Spectroscopy (FTIR), and atomic force microscope (AFM). the cytotoxicity of 400, 600, and 800 μg/ml to each GO, ZOL, and ZOL-GO was evaluated on a human hepatic cell line (WRL 68) and human prostate cancer cell line (PC3) using an MTT assay. The antitumor mechanisms of ZOL-GO were examined by cell cycle analysis. The results demonstrated That ZOL-GO caused a reduction in the cell viability of WRL 68
... Show MoreThe Gray Wolf Optimizer (GWO) is a population-based meta-heuristic algorithm that belongs to the family of swarm intelligence algorithms inspired by the social behavior of gray wolves, in particular the social hierarchy and hunting mechanism. Because of its simplicity, flexibility, and few parameters to be tuned, it has been applied to a wide range of optimization problems. And yet it has some disadvantages, such as poor exploration skills, stagnation at local optima, and slow convergence speed. Therefore, different variants of GWO have been proposed and developed to address these disadvantages. In this article, some literature, especially from the last five years, has been reviewed and summarized by well-known publishers. Fir
... Show MoreLand surface temperature (LST) is crucial for determining the region's environmental quality because a significant temperature rise causes disasters, which cause environmental imbalance, reducing biodiversity and hastening desertification. In this study, remote sensing and geographic information systems were used to estimate the change in the LST of Babylon, Iraq, using two satellite images taken 20 years apart (2002, 2022). The temperature was extracted using a specific mathematical model in ArcMap10.8 software. The findings demonstrated a significant variation in temperatures and the concentration in various regions of Babylon between 2002 and 2022 and the relationship between LST and Normalized difference
... Show MoreCopyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreThe purpose of this study is to investigate the effect of an elastic wall on the peristaltic flow of Williamson fluid between two concentric cylinders, where the inner tube is cylindrical with an inelastic wall and the outer wall is a regular elastic sine wave. For this problem, cylindrical coordinates are used with a short wavelength relative to channel width for its length, as well as the governing equations of Williamson fluid in the Navier-Stokes equations. The results evaluated using the Mathematica software program. The Mathematica program used by entering the various data for the parameters, where the program shows the graphs, then the effect of these parameters became clear and the results mentioned in the conclusion. Williamso
... Show MorePredicting the visibility of the lunar crescent drew great attention during the Middle Ages, especially among Muslims, because the dates of religious practices in Islam and calendars, in addition to being aware of the motion of the moon in its orbit, are based on the lunar month.
This paper aims to study the development of crescent visibility criteria from ancient times through the medieval period to the modern update. Some basics and astronomical terms related to crescent visibility are presented and then a comprehensive view of crescent visibility criteria is examined by surveying about 54 published research papers related to the issue of crescent visibility. Each research paper is summarized, classified, and the re
... Show MoreThis paper aims to early study of detection and diagnosis of kidney tumors and kidney stones using Computed Tomography Scanning CT scan images by digital image processing. Computerized Axial Tomography (CAT) is a special medical imaging technique that provides images with 3D, including much information about the body's construction consisting of bones and organs. A C.T scan uses X-rays to create cross-sectional images of the body and gives the doctor a full explanation of the diagnosis of the situation through the examination. It has been used in five cases of kidney images, including healthy, stones, tumors (cancer), cystic and renal fibrosis. The masking procedure is used to separate the required C.T. images
... Show MoreDue to the lack of vehicle-to-infrastructure (V2I) communication in the existing transportation systems, traffic light detection and recognition is essential for advanced driver assistant systems (ADAS) and road infrastructure surveys. Additionally, autonomous vehicles have the potential to change urban transportation by making it safe, economical, sustainable, congestion-free, and transportable in other ways. Because of their limitations, traditional traffic light detection and recognition algorithms are not able to recognize traffic lights as effectively as deep learning-based techniques, which take a lot of time and effort to develop. The main aim of this research is to propose a traffic light detection and recognition model based on
... Show MoreBaghdad University Radio Telescope (BURT) is a 3 meter radio telescope that was installed in the main campus of the University of Baghdad in Jadiriyah. Radio telescopes, in general, offer a wide range of applications in radio astronomy, which are usually used to detect the neutral hydrogen emission line at a wavelength of 21 cm. One of the key applications of BURT is to observe the Milky Way galaxy and to determine its rotation curve. However, performing such observations requires accurate determination of the appropriate observing time as well as the coordinates. This paper focuses on how the observing time and coordinates are calculated correctly and accurately. The horizontal coordinate that corresponds to the galactic coor
... Show MoreDeep learning techniques allow us to achieve image segmentation with excellent accuracy and speed. However, challenges in several image classification areas, including medical imaging and materials science, are usually complicated as these complex models may have difficulty learning significant image features that would allow extension to newer datasets. In this study, an enhancing technique for object detection is proposed based on deep conventional neural networks by combining levelset and standard shape mask. First, a standard shape mask is created through the "probability" shape using the global transformation technique, then the image, the mask, and the probability map are used as the levelset input to apply the image segme
... Show MoreEngineering project assessment at Al-Muthana Airport in Baghdad, Iraq, has been studied using a 3D electrical resistivity imaging survey. The site investigation is crucial for assessing the future of the region's infrastructures since it reveals the location of buried facilities or weak zones below the surface and measures localized groundwater levels. Wenner-Schlumberger array was used to conduct four parallel 2D electrical resistivity spreads (MU1 to MU4). Each spread line was 100 m in length with 1 m electrode spacing and an average spacing of 9 meters between any two adjacent lines. The depth of the investigation was around 23.8 m. Survey lines were drawn going from northwest to southeast. These spreads were combined to prov
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MoreTotal releasing phenolic compounds and allelopathic potential of the three sunflower genotypes Helianthus annuus L. residues were evaluated under open field conditions on weed flora associated with the proposed crops; wheat, broad bean and flax which are cultivated usually after the sunflower crop as successive crops. After getting seed from the sunflower crop. After getting seeds, sunflower plant parts were chopped and incorporated with field soil using a rotavator. Regarding the phenolics, total phenolic compounds released from sunflower residues were increased in-field soil and reached the highest concentration in the fourth week after mixing with soil. Significant suppression of weed flora was observed when the weed
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreIn this article, an attempt has been made to introduce the concept of Neutrosophic d-Filter and Neutrosophic Prime d-Filter of d-Algebra by generalizing the notion of Intuitionistic Fuzzy d-Filter of d-Algebra. Besides, we establish different properties of them. Further, we study several relations on this notion from the point of view of Neutrosophic d-Algebra.
Bai Hassan Oil field is considered one of the important north Iraq oil fields. The giant oil field of Bai-Hassan is located near Kirkuk City in North Iraq. The field consists of two domes (in SE – NW direction) Kithka Dome and Dauod Dome separated by a narrow saddle called Shashal saddle.
The current study is focused on microfacies analysis to interpret the stratigraphic sequence of the Palani Formation (early – lower Oligocene age), Baba, Bajawan and Tarjil Formations (middle Oligocene age).
The Bajawan Formation consists basically of five microfacies easily recognizable throughout the thin section. These microfacies are Lime Mudstone Microfacies, Miliolid Packestone Microfacies, Miliolid Grainstone Microfacie
... Show MoreThe study aims to detect the presence of carbapenems genes and the prevalence of antibiotic-resistant E. coli in the Tigris River. Samples were collected from three sites of the Tigris River: S1Adhamiya, S2 Medical city hospital, and S3 Abu Nuwas. It diagnosed 40 isolates of E. coli out of 67 isolates of bacteria by Vitek2. The antibiotic sensitivity was determined by the disk diffusion method. E.coli isolates were tested against 7 antibiotics these belonged to β-lactam, Carbapenem. Also, the resistance genes) blaVIM and blaNDM) detected for these isolates of E. coli. The results appeared resistance of E.coli against AMC 82.5%, PRL 62.5%, AM 55%, and moderate resistance
... Show MoreIn this paper, new integro-differential operators are introduced that defined by Salagean’s differential operator. The major object of the present study is to investigate convexity properties on new geometric subclasses included these new operators.
Ten new thiourea derivatives 1-10 were prepared in this work using a two-step process that involved reacting 4-methoxybenzoyl chloride with KSCN to afford 4-methoxybenzoyl isothiocyanate. This was followed by reaction with various amines (primary amines, secondary amines, and diamines) to give the aforementioned title products 1-10. These products were characterized by FT-IR, 1H NMR and 13C NMR spectroscopy. Using the DPPH scavenging method, the antioxidant activity of thiourea products was investigated, and derivative 8 had the greatest antioxidant activity in comparison to the other derivatives. Moreover, molecular dockin
... Show MoreThe main objective of this work is to generalize the concept of fuzzy algebra by introducing the notion of fuzzy algebra. Characterization and examples of the proposed generalization are presented, as well as several different properties of fuzzy algebra are proven. Furthermore, the relationship between fuzzy algebra and fuzzy algebra is studied, where it is shown that the fuzzy algebra is a generalization of fuzzy algebra too. In addition, the notion of restriction, as an important property in the study of measure theory, is studied as well. Many properties of restriction of a nonempty family of fuzzy subsets of fuzzy power set are investigated and it is shown that the restriction of fuzzy algebra is fuzzy algebra too.
The current study was conducted on 100 females who were divided into two main groups; 60 with breast cancer and 40 healthy controls. Blood samples were collected from both premenopausal and postmenopausal breast cancer and healthy women. The samples were appropriately processed for the analysis of trace elements (zinc, copper, and lead) by using flame atomic absorption spectrophotometry (FAAS). The results showed a highly significant decrease (p< 0.01) in the mean serum level of zinc of in both pre- and postmenopausal breast cancer women (71.7 + 5.1 and 70.4 + 5.4 µg/dL, respectively) compared with healthy controls (89.7 + 10.2 and 97.5 + 13.2 µg/dL, respectively) . Also, a highly significant
... Show MoreGiven a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.
Text documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the te
... Show MoreThe Hartha Formation is a major carbonate succession deposited during the Late Campanian period. The current study depends on four selected wells (EB 1, 2, 4 and 30) within the East Baghdad oil field to study electrofacies and petrophysical properties related to the reservoir characterization.
The Hartha Formation is divided into three electro-facies units using GR and SP logs in Petrel software. The upper unit of the Hartha Formation is composed mainly of limestone. The middle unit is composing of thick layers of shale. The lower unit is composed mainly of limestone with few shale layers. The three units are divided into three types of rocks in relation to the total porosity: 1. High-moderate active porosity rocks (type I)
... Show More