Many species are resistant to heavy metals in their surrounding polluted environment and Staphylococcus sp. is an example. This study aimed to isolate and characterize bacteria resistant to heavy metals in the Shatt Al-Arab River in southern Basra, Iraq. Based on the morphology and using Vitek II system, and due to their high resistance to heavy metals (mercury and chromium), two species of Staphylococcus (Staphylococcus lentus and Staphylococcus lugdunensis) were chosen and isolated. The minimum inhibitory concentration (MIC) of the isolates against Hg and Cr was determined after 72 h. of incubation in solid media. All isolates were resistant to Hg (2000 mgL-1) and Cr (4000mgL-1). Living biomass of S. lentus and S. lugdunensis was used to remove the heavy metal ions in various concentrations (5, 10 and 25 mgL-1) of the solutions of aqueous metals. After 72 hours incubation, the removal percentage of S. lugdunensis was 98.91 and 78.78% for Hg and Cr respectively. That for S. lentus it was 77.83% for Cr after 72 hours, and 98.84% for Hg after 24 h. of incubation. The scanning electron microscope approved that the removal of these metals causes morphological changes in bacteria.
Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show MoreRecently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation areas, evaporation / precipitation, river levels
... Show MoreThe corrosion behavior of Zn in 0.1 M HCl solution containing various concentration of Ampicillin range (2 x 10-4 – 1x10-3) M was investigated. The corrosion rates were measured by using weight loss measurement and polarization curve, The results of polarization method obtained showed that the rate of corrosion of zinc increased with increasing the temperature from 293K to 323K and the values of inhibition efficiency of ampicillin increased with increasing the temperature and AMP concentrations, the results showed that AMP caused to protection efficiency reached to 88.8% when (1x10-3) M AMP concentration was used in 323K. The coverage (θ) of metal surface by AMP could be obtained from the rate of corrosion in the presence and absence
... Show MoreGround water hydrochemical study in Yusufiyah depends upon (25) wells where major cations and anions were obtained as well as trace elements. The hydrochemical properties include the study of (pH, EC, TDS, and TH). The groundwater of the study area is odorless and colorless except the wells (13 and 16) with a salty taste due to the elevated (TDS) concentration in it, where the wells depth ranges between 7-20 meters. Depth of water in these wells was about 25-35 meters above sea level. Groundwater generally flows from east to west and from north east to south west. The resource of groundwater depends upon surface water. Physical specifications are measured in the water samples included temperature, color, taste, odor, pH, electrical condu
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe aim of the present research is to investigate the effecting of pH parameter on the feasibility of lead removal from simulated wastewater using an electrochemical system. Electrocoagulation method is one of electrochemical technology which is used widely to treat industrial wastewater. Parameters affecting this operation, such as initial metal concentration, applied current, stirrer speed, and contact time of electroprocessing were taken as 155ppm, 1.5 Ampere, 150 rpm, 60 minutes respectively. While pH of the simulated wastewater was in the range of 2 to 12 in the experiments. It was found from the results that pH is an important parameter affecting lead removal operation. The best value of pH parameter is appro
... Show MoreThe typical test for diagnosis of severe acute respiratory syndrome coronavirus 2 is a reverse transcription-polymerase chain reaction (RT-PCR) technique, but the chest CT scan might play a complementary role at the first detection of Coronavirus Disease 2019 (COVID-19) pneumonia. Objectives: To determine the sensitivity of CT scan on patients with COVID-19 in Al-Najaf, Iraq, and to compare the accuracy of CT scan with that of RT-PCR technique. Material and Method: This is a prospective study. The patients suspicious of having COVID-19 infection and respiratory symptoms were registered. All patients were diagnosed by RT-PCR and chest CT. Diagnostic performance of CT was intended using RT-PCR as the reference sta
... Show MoreThree nematodes : Amidostomum acutum , Epomidiostomum uncinatum and Hadjelia truncata , were recovered from the gizzards of wintering mallard collected at two sites in central Iraq. A brief description of the parasites along with some notes on their infection rate, prevalence and discussion with the pertinent literature are provided.