In this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Correspondence Analysis (CCA) indicate (60.2% and 39.79%) variability among first II axis. On this basis of the result it is obvious that water turbidity is trigger of the abundance and distribution whereas total dissolved solids (TDS) showed minimal influence deduced from CCA analysis.
The extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.
In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.
In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, the series solution for unsteady flow for an incompressible viscous electrically conducting fluid of second grad over a stretching sheet subject to a transverse magnetic field is presented by using homotopy analysis method (HAM). Also we examines the effects of viscoelastic parameter, magnetic parameter and time which they control the equation of motion.
Copper Zinc Sulphide (Cu0.5Zn0.5S) alloy and thin films were fabricated in a vacuum. Nano crystallized (CZS) film with thick 450±20 nm was deposit at substrates glasses using thermal evaporation technique below ~ 2 × 10− 5 mbar vacuum to investigated the films structural, morphological and optical properties depended on annealing temperatures ( as-deposited, 423, 523 and 623) K for one hour. The influences annealed temperature on structurally besides morphologically characteristics on these films were investigated using XRD and AFM respectively. XRD confirms the formation a mixed hexagonal phase of CuS-ZnS in (102) direction with polycrystalline in nature having very fine crystallites size varying from (5.5-13.09) nm. AFM analys
... Show MoreIn the present work, pattern recognition is carried out by the contrast and relative variance of clouds. The K-mean clustering process is then applied to classify the cloud type; also, texture analysis being adopted to extract the textural features and using them in cloud classification process. The test image used in the classification process is the Meteosat-7 image for the D3 region.The K-mean method is adopted as an unsupervised classification. This method depends on the initial chosen seeds of cluster. Since, the initial seeds are chosen randomly, the user supply a set of means, or cluster centers in the n-dimensional space.The K-mean cluster has been applied on two bands (IR2 band) and (water vapour band).The textural analysis is used
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreThe present work covers the analytical design process of three dimensional (3-D) hip joint prosthesis with numerical fatigue stress analysis. The analytical generation equations describing the different stem constructive parts (ball, neck, tour, cone, lower ball) have been presented to reform the stem model in a mathematical feature. The generated surface has been introduced to FE solver (Ansys version 11) in order to simulate the induced dynamic stresses and investigate the effect of every design parameter (ball radius, angle of neck, radius of neck, neck ratio, main tour radius, and outer tour radius) on the max. equivalent stresses for hip prosthesis made from titanium alloy. The dynamic loading case has been studied to a stumbling ca
... Show MoreIn this paper, the series solutions of a non-linear delay integral equations are considered by a modified approach of homotopy analysis method (MAHAM). We split the function into infinite sums. The outcomes of the illustrated examples are included to confirm the accuracy and efficiency of the MAHAM. The exact solution can be obtained using special values of the convergence parameter.
Many studies revealed that Chlamydia trachomatis is the most prevalent bacteria “that cause sexually transmitted infections in the world.. Most of these infections are asymptomatic and there is a remarkable relationship between CT infections and male infertility. Therefore, “the present study is established to determine the effect of Chlamydia trachomatis infection on seminal fluid quality in males suffering from infertility compared with fertile males.. “Semen samples were collected from 63 infertile male and 13 fertile male as control group, attending the clinical laboratory for routine seminal fluid analysis. Seminal fluid was analyzed according to World Health Organization guidelines, the whole geno
... Show MoreShallow foundations have been commonly used to transfer load to soil layer within the permissible limits of settlement based on the bearing capacity of the soil. For most practical cases, the shape of the shallow foundation is of slight significance. Also, friction resistance forces in the first layers of soils are negligible due to non-sufficient surrounding surface area and compaction conditions. However, the bearing capacity of a shallow foundation can be increased by several techniques. Geocell is one of the geosynthetic tool applied mainly to reinforce soil. This study presents a numerical approach of honeycombed geocell steel panels reinforcing the sandy soil under shallow foundation, and several parameters are investigated such as th
... Show More