Twilight is that light appear on the horizon before sunrise and after sunset, Astronomically it is known that sunrise and sunset are effected by high above sea level, but the effect of high above sea level on the time of astronomical twilight still not decided and controversy among astronomers, in This research we studies the effect of high above sea level on the time of astronomical twilight, through adding the equation correct high above sea level to equation computation of twilight and then calculate of changing in the time of twilight for different highest (0-10000) meters above sea level , and the ratio of increase for time with high between (15.45-20.5) minutes. It was found that there was an increase in the time of the twilight along the year when increasing high above sea level and that surely effected time of astronomical twilight with high above sea level, but this effect is strong for high to 2000 meters and then high effect will be less to increasing the time of twilight.
The present study develops the sorption model for simulating the effects of pH and temperature on the uptake of cadmium from contaminated water using waste foundry sand (WFS) by allowing the variation of the maximum adsorption capacity and affinity constant. The presence of two acidic functional groups with the same or different affinity is the basis in the derivation of the two models; Model 1 and Model 2 respectively. The developed Bi-Langmuir model with different affinity (Model 2) has a remarkable ability in the description of process under consideration with coefficient of determination > 0.9838 and sum of squared error < 0.08514. This result is proved by FTIR test where the weak acids responsible of cadmium ions removal
... Show MoreBackground: The mechanical and physical properties of Polymethyl methacrylate (PMMA) don’tfulfill the entire ideal requirements of denture base materials. The purpose of this study was to produce new modified polymer nanocomposite (PMMA /ZrO2-TiO2) andassess itsimpact strength, transverse strength and thermal conductivity in comparison to the conventionalheat polymerized acrylic resin. Materials and Methods: Both ZrO2 and TiO2nano fillers were silanized with TMSPM (trimethoxysilyl propyl methacrylate) silane coupling agent before beingdispersed by ultrasonication with the methylmethacrylate (monomer) and mixed with the polymer by means of 2% by weight in (1:1) ratio, 60 specimens were constructed by conventional water bath processing
... Show MoreKamil, S.H. 2024. Effects of Aqueous and Alcoholic Extracts of Lemongrass, Cymbopogon citratus on Some Biological Aspects of the Fig Moth, Ephestia cautella. Arab Journal of Plant Protection, 42(3): 377-381. https://doi.org/10.22268/AJPP-001245 This study evaluated the effects of aqueous and ethanolic extracts of lemongrass on the third instar larvae of the date moth Ephestia cautella Walker (Lepidoptera: Pyralidae). The results obtained showed that there were toxic effects of aqueous extract, which produced the highest mortality rate of 43.35% at 5% concentration72 hours after treatment, whereas the lowest mortality rate of 17% was obtained at 0.5% concentration, 72 hours after treatment. The LC50 was 0.082%. The results indicated
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show More
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More