In this study, the genus Xylocopa Latreille, 1802 (Hymenoptera: Apidae) was revised. There were 4 species registered in our investigations: X. hottentotta Smith, 1854; X. olivieri Lepeletier, 1841; X. pubescens Spinola, 1838 and X. valga Gerstäcker, 1872, the first species was described as being found for the first time for the insect fauna of Iraq, which were obtained from Solanum melogena L. flowers. Key to the species was constructed and supported by figures of the main diagnostic characters and some morphological features, illustrated and compared with other species, which are recorded in the current survey.
In the present work, a study is carried out to remove chromium (III) from aqueous solution by: activated charcoal, attapulgite and date palm leaflet powder (pinnae). The effect of various parameters such as contact time, and temperature has been studied. The isotherm equilibrium data were well fitted by Freundlich and Langmuir isotherm models. The adsorption capacity of chromium (III) that was observed by activated charcoal, attapulgite and date palm leaflet powder (pinnae) increased with the rise of temperature when the concentrations of Cr (III) were 600, 700 and 100mg/L respectively. The greatest adsorption capacity ofactivated charcoal, attapulgite and date palm leaflet powder (pinnae) at 10°C was 7.51, 5.39 and 0.77mg.gˉ¹ respective
... Show MoreIn study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
Previously many properties of graphene oxide in the field of medicine, biological environment and in the field of energy have been studied. This diversity in properties is due to the possibility of modification on the composition of this Nano compound, where the Graphene oxide is capable of more modification via addition other functional groups on its surface or at the edges of the sheet. The reason for this modification possibility is that the Sp3 hybridization (tetrahedral structure) of the carbon atoms in graphene oxide, and it contains many oxygenic functional groups that are able to reac with other groups. In this research the effect of addition of some amine compounds on electrical properties of graphene oxide has been studied by the
... Show MoreExperiments research is done to determine how saturated stiff clayey soil responds to a single impulsive load. Models made of saturated, stiff clay were investigated. To supply the single pulse energy, various falling weights from various heights were tested using the falling weight deflectometer (FWD). Dynamic effects can range from the major failure of a sensitive sensor or system to the apparent destruction of structures. This study examines the response of saturated stiff clay soil to a single impulsive load (vertical displacement at the soil surface below and beside the bearing plates). Such reactions consist of displacements, velocities, and accelerations caused by the impact occurring at the surface depth induced by the impact loads
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More