Imidacloprid is systemic insecticide (1-[(6-chloro-3-pyridinyl) methyl]-N-nitro-2-imidazolidinimine) and the world’s most widely used has significant efficacy against a broad variety of pests and a unique mode of action by using it spreader and irrigation. The persistence of this pesticide in the soil means that it causes environmental damage that must be cleaned up. In this study collected and identified the best bacteria isolate that breakdown imidacloprid from the Plant Protection Director in Baghdad, which has been using neonicotinoid pesticides for years in their own greenhouse for pest control. Using high-performance liquid chromatography HPLC to measuring the residual concentrations of imidacloprid in MSM media at a concentration of 25 mg/L for 21 days to know the best degrading bacterial isolate for imidacloprid. The best bacterial isolate No.43 was able to degrade 50.2% for 21 days of imidacloprid which was identified as Rhizobium pusense according to morphological, cultural and biochemical tests. Moreover, genetic analysis for the 16S rRNA gene and given a new accession number (OP218458.1.) in the GenBank of NCBI. It could be concluded, from this study that the soil previously contaminated for long periods of time with imidacloprid can be treated by degrading the imidacloprid residues in it by isolated bacteria Rhizobium pusense.
The removal of direct blue 71 dye from a prepared wastewater was studied employing batch electrocoagulation (EC) cell. The electrodes of aluminum were used. The influence of process variables which include initial pH (2.0-12.0), wastewater conductivity (0.8 -12.57) mS/cm , initial dye concentration (30 -210) mg/L, electrolysis time (3-12) min, current density (10-50) mA/cm2 were studied in order to maximize the color removal from wastewater. Experimental results showed that the color removal yield increases with increasing pH until pH 6.0 after that it decreased with increasing pH. The color removal increased with increasing current density, wastewater conductivity, electrolysis time, and decreased with increasing the concen
... Show MoreThis research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculate
... Show MoreLower neck pain is one of the problems facing all ages, especially the elderly, as it revolves around the causes of this pain from many diverse factors. The aim of the research is to use special intense exercise accompanied by intermittent electrical stimulation to get rid of lower neck pain among professors of the College of Science - University of Baghdad for ages. (40-60) years and to identify the extent of the effect. The research assumed the presence of statistically significant differences. The research sample represented professors at the University of Baghdad - College of Science who suffer from continuous pain for the period between (10/15/2023) and (1/15/) 2024) and their number is (5), The researchers used the experimenta
... Show MoreThe present study, entitled “ linguistic characteristics (the morphology - nominal suffixes ) of a number of (Quriyat or koyrat ) by the poet Kamal Mustafa Daquqli, aims at studying and making a comparison between Turkmen dialect written and spoken forms that show many of the hidden language structures. Similarly, the study sheds light on the poet as one of the most prominent literary figures in Turkmenistan literature.
Turkman Quriyat is one of Turkman blank verse significant forms. Apart from (songs and Quriyat) and until the 19th C., folk poetry has been stalled for a long time but reclaimed its literary high position in the middle of the 20th C.
The study introduction briefly discusses Tu
... Show MoreBackground: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja