The present research was performed to study the qualitative and quantitative composition of epiphytic algae on the aquatic host plant Ceratophyllum demersum L. Four sites in Tigris River, at Wassit Governorate were covered, during the seasons of Autumn 2017, winter 2018, Spring 2018, and Summer 2018. The study also included measuring the physiochemical parameters (temperature of air and water, pH , water level, EC, salinity, TDS, TSS, dissolved oxygen, BOD5, alkalinity, total hardness, calcium, magnesium, total nitrogen, total phosphourus). The total number of species of epiphytic algae was145 species, 98 species belonging to Bacillariophyceae, followed by 27species of class Cyanophyceae, 19 species of class Chlorophyceae, 4 species of class Euglenophyceae, and only 1 species for each of Chrycophyceae and Rhodophceae. The total number of epiphytic algae ranged from 1681× cell/gm in Winter to 2014.95× cell/gm in Spring. The range of biodiversity indices was (1-8.2) for Richness index, (1.5-3.2) for Shannon index and (0.3-0.65) for Evenness index.
This study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877, Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae is the lesser species.
A summary of the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi
... Show MoreLaboratory studies were carried out to investigate the differences between uninfested and infested bitter orange
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis study aims to establish an empirical correlation between biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) of the sewage flowing in Al-Diwaniyah wastewater treatment plant. The strength of the wastewater entering the plant varied from medium to high. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate rapid effluent assessment or optimal process control. The equations relating the percentage removal of
... Show MoreThe Ozone Monitoring Instrument (OMI) measures the reflected solar radiation in the ultraviolet and visible part in the spectral range that is between 270 and 500 nm, using two channels with a spectral resolution of about 0.5 nm. Ground-level tropospheric ozone is one of the air pollutants of most concern. In the troposphere, near the Earth's surface, human activities lead to ozone concentrations several times higher than the natural background level. To evaluate the ozone distribution over Iraq, the ozone data from OMI were analyzed using geostatistical techniques. Theoretical spherical models provided the best fit for all monthly experimental variograms. The parameters of these variograms (sill, range and nugget) wer
... Show MoreThe Mesopotamian marshlands faced a massive destruction from many years and this lead to effect to ecosystem. In this study a survey was made on the physical chemical and heavy metals characteristics and microbiological analysis of AL Chibaish marsh during the two months. Water analyses revealed unacceptable values for almost all physiochemical and biological properties, according to WHO standard limits for drinking water. Almost all major ions and heavy metal concentrations in water showed a distinct decreasing trend at the marsh outlet station compared to other stations. In general, major and minor ions, as well as heavy metals exhibit higher concentrations in location 1 than in location 3. The concentrations of heavy metals in water show
... Show MoreThe aim of the present research is to illustrate γ-ray levels emitting from soil and bitumen producing from 238U, 232Th, and 40K along Abu-Jir Fault Zone. in the area extended from Al-Marj valley to Abu-Jir village using scintillometer device. Such study is important in environmental assessment to buildup data base about radioactivity. The concentration of natural radionuclides in the study area was determined to be occurring mostly in the clay minerals and organic matter. A high purity germanium spectrometer was used to detect the activity of these elements which ranged between 00.6±18.1- 1526±102, 0- 8.4±1.4, and 70.1±10.9- 328.2±73 in soil, and 28.2±5.6- 94±22.1, 0- 2.2±0.5, and 38.4±7.9- 70.1±10.9 in bitumen for 226Ra
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreDelays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in
... Show MoreAbstract
Objective(s): The study aims to measure the effectiveness of the program on removing dead tissue for burn patients by testing the nurses before the program in addition to testing them again after implementing the educational program.
Methodology: The study is quantitative in nature (one experimental) and will employ pre- and post-testing techniques between October 17, 2020 and March 20, 2022. A non-probability (purposive) sample of 24 nurses working in the Azadi Teaching Hospital's Burns and Plastic Surgery Center was chosen. The experimental survey of nursing practice, a literature review, scientific records, and previous research were all taken into considerat
... Show More