The present study has been carried out to estimate heavy metals mobility, bioconcentration and transfer from polluted soil to roots tissues and from roots tissues to aerial parts using bioconcentration factor and translocation factor. Soil samples and the biomass of the eight vegetable species have been collected during summer season, 2019 from four different sites in Wadi Al-Arg, Taif Governorate, KSA. In general, heavy metals content of soil samples in site III and IV have recorded elevated values compared with those of site I and II. The soil from site IV has shown the highest concentration of Mn, Ni, Cr, Pb, Cu, and Cd amounted 31.63, 14.05, 13.56, 22.79, 31.02 and 2.98 mg/kg dry soil respectively, while the soil from site III has shown the highest concentration of Zn. The data referred to the fact that Mentha longifolia, Cucumis sativus, Capsicum annuum, Lactuca sativa Cucurbita pepo, and Anethum graveolens that grown in sites of investigation could be recognized as suitable for human consumption. These six vegetables could accumulate the measured heavy metals in their tissues with acceptable quantities, less than the permissible levels of Food and Agriculture Organization of the United Nations (FAO). Otherwise, heavy metal concentrations in Solanum lycopersicum and Solanum melongena have been found to be higher than permissible limits of FAO. Both plants also have shown elevated bioconcentration factors values for most of measured heavy metals. For S. lycopersicum the bioconcentration factor values of Fe, Cd, Cu, Pb, Cr, Mn, Ni, and Zn have been found to be 42.150, 27.250, 1.023, ND, 5.926, 4.649, 29.409, and 0.459 respectively. While for S. melongena, they have been 2.360, 21.333, ND, 0.170, ND, 3.113, 50.318, and 0.623, respectively. To avoid the harmful effects of the heavy metals accumulation on human health, consideration should be given to the constant examination to the edible parts of the vegetables grown in heavy metals contaminated soil.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe danger of the attacks of 9/11 in America, mainly on the WorldTrade Center at Ground Zero, had brought America into a position thatnever seen before. People who lived there faced a historical calamity marked a turning point in history and a beginning of a new era. Thepaper examines the behavior of traumatized individuals in relation tosociety that trauma involves both. The socio cultural approach willachieve the goal. It studied the responses of the individuals to the event and the motives behind these reactions. Don DeLillo, a member of apost 9/11 group of writers, an American novelist of Italian origin, through his portrayal of the characters, tries to present a vivid image t
... Show MoreIn this paper, we propose an approach to estimate the induced potential, which is generated by swift heavy ions traversing a ZnO thin film, via an energy loss function (ELF). This induced potential is related to the projectile charge density, ρq(k) and is described by the extended Drude dielectric function. At zero momentum transfer, the resulting ELF exhibits good agreement with the previously reported results. The ELF, obtained by the extended Drude model, displays a realistic behavior over the Bethe ridge. It is observed that the induced potential relies on the heavy ion velocity and charge state q. Further, the numerical results show that the induced potential for neutral H, as projectile, dominates when the heavy ion velocity is less
... Show MoreThe Middle Cenomanian-Early Turonian Mishrif Formation includes important carbonate reservoirs in Iraq and some other surrounding countries due to their high reservoir quality and wide geological extension. The 2D models of this study for facies, effective porosity and water saturation indicate the vertical and lateral heterogeneity of the Mishrif Formation reservoir properties in the Majnoon oil field. Construction of 2D reservoir model of the Mishrif Formation to explain the distribution of facies and petrophysical properties (effective porosity and water saturation) by using RockWorks software. The increase of effective porosity is attributed to the presence of shoal facies.The high water saturation is attributed to the existence of rest
... Show MoreReflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A
... Show MoreWe present the notion of bipolar fuzzy k-ideals with thresholds (
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show More