Bacterial contamination of AL-Habania reservoir was studied during the period from February 2005 to January 2006; samples were collected from four stations (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir). Coliform bacteria, faecal Coliforms, Streptococci, and faecal Streptococci were used as parameters of bacterial contamination in waters through calculating the most probable number. Highest count of Coliform bacteria (1500 cell/100ml) was recorded at AL-Razaza during August, and the lowest count was less than (300 cell/100ml) in the rest of the collection stations for all months. Fecal Coliform bacteria ranged between less than 300 cells/100ml in all stations for all months to 700 cell/100ml in AL-Warrar, AL-Razaza and in the middle of the reservoir stations during August. Streptococci bacteria count ranged between less than 300 cell/100ml to 700 cell/100ml as a highest record in AL-Razaza station during August for both. The ratio between fecal coliforms and fecal streptococci (FC: FS) was detected to determined the origin of the pollution in the reservoir depending on Geldrich statistical law in this research, the ratio ranged between (1) to (2.3).
The research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti
... Show MoreBackground This study aimed to evaluate the efficacy of once-daily liraglutide as an add-on to oral antidiabetics (OADs) on glycemic control and body weight in obese patients with inadequately controlled type 2 diabetes (T2D). Methods A total of 27 obese T2D patients who received 7 months (0.6 mg/day for the first month, 1.2 mg/day for 3 months, and 1.8 mg/day for 3 months) of liraglutide treatment as an add-on to OADs were included. Data on body weight (kg), fasting plasma glucose (FPG, mg/dL), postprandial glucose (PPG, mg/dL), and HbA1c (%), were recorded. Results Liraglutide doses of 1.2 mg/day and 1.8 mg/day were associated with significant decreases in body weight (by 8.0% and 11.9%, respectively, p < 0.01 for each) and HbA1c (by 20.0
... Show MoreMost dinoflagellate had a resting cyst in their life cycle. This cyst was developed in unfavorable environmental condition. The conventional method for identifying dinoflagellate cyst in natural sediment requires morphological observation, isolating, germinating and cultivating the cysts. PCR is a highly sensitive method for detecting dinoflagellate cyst in the sediment. The aim of this study is to examine whether CO1 primer could detect DNA of multispecies dinoflagellate cysts in the sediment from our sampling sites. Dinoflagellate cyst DNA was extracted from 16 sediment samples. PCR method using COI primer was running. The sequencing of dinoflagellate cyst DNA was using BLAST. Results showed that there were two clades of dinoflag
... Show MoreBackground: Orthodontic tooth movement is characterized by tissue reactions, which consist of an inflammatory response in periodontal ligament and followed by bone remodeling in the periodontium depending on the forces applied. These processes trigger the secretion of various proteins and enzymes into the saliva.The purpose of this study was to evaluate the activity of alkaline phosphatase (ALP) in saliva during orthodontic tooth movement using different magnitude of continuous orthodontic forces. Materials and Methods: Thirty orthodontic patients (12 males and 18 females) aged 17-23 years with class II division I malocclusion all requiring bilateral maxillary first premolar extractions were randomly divided into three groups according to t
... Show MoreEfficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
The natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi
... Show MoreThe female Shabout were collected as samples from Dijla river in Baghdad. The oocyte developmental stages were divided in to nine stages, based on nucleus structure , cellular inclusions and ovarian follicle structure ,they are:-( Oogonia stage , Early Perinucleolar Stage , Advanced Perinucleolar Stage , Cortical Alveoli Stage , Primary Yolk Stage , Secondary Yolk Stage , Tertiary Yolk Stage , Migratory Nucleus Stage , Hydration Stage(
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More