The study was conducted in the Tigris River in Baghdad during May 2021 until March 2022 to follow the impact of climate change, rising temperatures, and the presence of pollutants on the dynamics of phytoplankton and some physicochemical variables from four sites. The results showed that the climatic conditions during different seasons, in addition to the nature of the sampling sites, have a clear and significant impact on the studied traits and, in turn, affect the phytoplankton community. The highest average temperature (30.67 ˚C) was recorded; the pH values ranged between 8.70 & 6.75; the electrical conductivity (1208.18-770.11 µS/cm ) and the total dissolved solids (TDS) (778.95- 439.49 mg/L) were evaluated. Upon measuring the total hardness and turbidity, a significant increase was detected at the third site during winter, amounting to 67.26 NUT and 775.46mg/ L, respectively. The dissolved oxygen concentration (DO) was recorded at the fourth site during winter (10.08- 4.67 mg/L), while the BOD ranges were 4.87- 2.51mg/ L. A benefit in the average values of plant nutrients was detected at the third site affected by the waste liquid disposal area of the Medical City Hospital Complex compared to the nutrient concentration at the other three sites, which was 3.43, 4.87, 13.50 & 409.00mg/ L for NO3 PO4 and SiO2 and S04, respectively, The study was able to classify 161 species of phytoplankton belonging to 69 genus, the largest percentage of which was Baciliariophyceae (42%), followed by Cyanophyceae (27%), Chlorophyceae (24%), Euglenophyceae (4%) and 1% for Chrysophyceae, Xanthphyceae, and Cryptophyceae. Recent years have witnessed severe climatic conditions affecting various environmental factors in the study area. The phytoplankton community has been vulnerable to their impact altering the physical and chemical properties of the river water. This indicates that the aquatic environment responds to climatic conditions.
This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show MoreThe COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreBackground: Many cardiac diseases can cause cardiac hypertrophy developed by the established cardiac overload, such as long term of uncontrolled hypertension, valvuler disease or congenital anomaly and many more causes. If the cause of hypertrophy persists for long time it will generate heart failure, as a result changes in size, shape and function of the heart which refer as remodeling.
Objective: To investigate the types of remodeling in patients with heart failure, and study its relation with cardiac performance.
Patients and methods: The study included fifty normal individuals and fifty patients, only those patients who developed hypertrophy and failure were chosen. The study has included the measurements of many cardiac parame
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreOffline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters. In this paper a proposed method for Offline Arabic handwritten recognition. The proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and support vector machines (SVMs) to enhance the recognition accuracy. The proposed method experimented using (AHDB) database. The experiment result show (99.08) recognition rate.