
Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreForty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThe best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res
... Show MoreAttention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreIn light of this, attention should be paid to tax reform as part of a comprehensive economic reform program. Therefore, the research started from the problem of the weak efficiency of the tax reform process in the General Authority for Taxation, as well as the need to know the addition of new taxes or increase taxes.The research aims study the relative importance of each disabled person, whether organizational, human, financial, legislative or technical. The research led to a number of conclusions, the most important of which were that the financial obstacles occupy the highest importance of the other obstacles and for the success of the tax reform, the material resources must be provided in order to provide the n
... Show MoreThe research includes the preparation of several complexes of the internal transition elements lanthanide (Ln = La, Nd, Er, Gd, and Dy) containing the 4f shell, with Schiff bases resulting from condensation reactions between 4-antipyrinecarboxaldehyde and 2-aminobenzothiazoles. Schiff's base was identified using FTIR spectra, UV-vis spectroscopy, elemental microanalysis CHNSO, nuclear magnetic resonance, mass spectrometry, and TGA thermal analysis. The complexes were studied and identified with elemental microanalysis CHNSO, FTIR spectroscopy, UV-vis spectroscopy, TGA thermal analysis, conductivity measurement, and magnetic sensitivity. The result showed that these complexes were classified as homogeneous bidentate complexes with th
... Show MoreThe purpose of this study was to know the reality of motivational administrative methods for academic decision-makers in the faculties of physical education and sports sciences in Baghdad from the perspective of faculty members. To solve the nature of the current problem, the two researchers used the descriptive approach of the survey method. The two researchers determined their research community by limiting the sample to all faculty members in the faculties of physical education and sports sciences in Baghdad (Al-Mustansiriya University, Al-Jadriya Univeristy & Al-Waziriyah University). Their number reached 314 faculty members and the two researchers determined their research community by 90%, so the research sam
... Show MoreThe insurance Sector of important vessels saving that work on the accumulation of capitals which contribute to the financing of economic and social development plans of countries, in order to achieve of marketing superiority in presenting the insurance services it would require insurance companies focus their marketing efforts and increased interest in internal customer to recruitment new customers and keep of current customers, so the research aims to release the impact of the dimensions of the internal marketing of (the company's vision, training and development, incentive and, motivation, internal communication) in the dimensions of the marketing superiority (to keep the customer, service quality, customer satisfaction, customer, valu
... Show More