Several remote sensor network (WSN) tasks require sensor information join. This in-processing Join is configured in parallel sensor hub to save battery power and limit the communication cost. Hence, a parallel join system is proposed for sensor networks. The proposed parallel join algorithm organizes in section-situated databases. A novel join method has been proposed for remote WSNs to limit the aggregate communication cost and enhance execution. This approach depends on two procedures; section-situated databases and parallel join algorithm utilized to store sensor information and speed up processing respectively. A segment arranged databases store information table in segmented shrewd. The Parallel-Joining WSN algorithm is effectively feasible for two clear reasons. Firstly, the decisive join conveyed fragments. Secondly, parallel-joining is in the fly processed sensor data. Creatively, a parallel dispersed algorithm has been developed to gain time compared to the single disseminated algorithm.
During the period from September 2013 till the end of July 2014 ,a total of 340 birds Passer domesticus were collected from Tikrit city . The study revealed the infection of birds with seven species of cestoda helminthes , belonging to the genus Raillietin . These species included R. tetragona , R. echinobothrida , R. cesticellus and R. ransomi with prevalence infection of 36.1% , 30.1% . 15.0 % and 1.8 % respectively . And the genus Choanotaenia . These species included C. infundibulum and C. passerine with pervatence infection of 15.0% and 0.6% respectively . And the genus Anonchotuenia . The species included A.globate with prevantence infection 1.2% .
... Show More Fusobacterium are compulsory anaerobic gram-negative bacteria, long thin with pointed ends, it causes several illnesses to humans like pocket lesion gingivitis and periodontal disease; therefore our study is constructed on molecular identification and detection of the fadA gene which is responsible for bacterial biofilm formation. In this study, 10.2% Fusobacterium spp. were isolated from pocket lesion gingivitis. The isolates underwent identification depending on several tests under anaerobic conditions and biochemical reactions. All isolates were sensitive to Imipenem (IPM10) 42.7mm/disk, Ciprofloxacin (CIP10) 27.2mm/disk and Erythromycin (E15) 25mm/disk, respectively. 100% of
Sludge worm samples were collected from the Tigers River sediment during the period from November 2018 to June 2019 in Al Sarafiya District/ Baghdad- Iraq. Biometric morphological measurements focusing on the form of penis sheath and chaetal morphology were used for species identification, in addition to molecular analysis by amplification of conserved 18s rRNA encoding gene using ITS1 and ITS4 universal primers.According to the morphological measurement records, the results revealed the existence of Limnodrilus hoffmeisteri Claparede 1862, L. claparedeianus Ratzel, 1868 and L. cervix Brinkhurst 1963. Other two groups of specimens, with short penis sheath, were identified by molecular technology as L
Eimeriosis is a major problem affecting ruminants worldwide. The disease is primarily caused by Eimeria species, which are specialized for each host and grow in the small and large intestine of animals. The losses due to subclinical infections (especially weight loss) and clinical disease (diarrhea) make the species of this genus a very significant economic concern. Therefore, this study was conducted in some areas of Wasit Province. A total of 180 fecal samples from goats, of both sexes and covering different age groups and months, were collected. All fecal samples were examined microscopically, and 75 positive fecal samples were taken for molecular examination and further analyzed using conventional PCR, sequencing and phylogeneti
... Show MoreThe aim of this study was to isolate and identify the cyanobacterium Scytonema hofmanni Var. calcicolum from the domestic drinking tanks as a new record in Iraqi drinking water. Scytonema hofmanni var. calcicolum, a filamentous freshwater cyanobacterium (blue-green alga). This alga was isolated from the walls of the domestic plastic water tanks in Al- karkh/ Baghdad city on July 2014. The sampling was performed by collecting three samples from this tanks, the three examined samples microscopically revealed the dominance of this cyanobacterium as unialgal in the studied samples. The results showed this alga has the ability to tolerate high temperature up to 42 Cº and very low light intensity inside the tanks which up to 10 μE/m²/s.
This research deals with the effect of constructive conflict of the organizational identification .These relatively recent subjects have relative importance in the field of administration and they have strong effect in the success of organizations .The objective of this research is to detect the level of the constructive conflict and the organizational identification in the center of The Ministry of Planning. So, two major hypotheses were formulated The first are searched the correlation between the constructive conflict and the organizational identification and it emerged with four sub-hypotheses searched the correlation among every dimension of the constructive conflict with the organizational identification .The second major h
... Show MoreThis work includes synthesis of some new derivatives of Schiff bases as intermediate compounds. Through the reaction 1,4- phen ylene diamine with different aromatic aldehydes substituted by many different groups in acidic medium and absolute ethanol as a solvent to obtain the Schiff bases (1a-5a). These compounds are reacted with substituted aromatic carboxylic acids and anhydride to give three types of heterocyclic compounds. The first line includes direct reaction with maleic anhydride under certain conditions to give new derivatives of oxazpine(6b-10b). The second line includes reaction of compounds (1a-5a) with 2-mercapto benzoic acid in the presence of triethyl amine as a catalyst and dry benzene as a solvent to give new derivatives
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More