The study was designed in the northwestern part of Karbala city for the purpose of knowing the efficiency of some plant species of trees and shrubs planted by the municipality of the city to contribute to the deposition of dust particles suffered by the city's environment, in particular, as well as its ability to accumulate heavy metals in dust or soil, and to consider the study model for application in different parts of Iraq. It was found that the plant species (Acacia , Eucalyptus , Clkonukiyrs and Dodenia) in the studied area that were given the symbols (A,B,C and D respectively). Used the method of calculating the leaf area index to calculate the amount of dust drawn by the stock plant, then chemical digestion dry and wet techniques spectroscope Flame atomic and spectroscope atomic Flame is to detect the level of metals (lead, Pb, cadmium Cd, Selenium, Se, chromium, Cr, cobalt, Co, As, iron Fe, zenc, Zn, and manganese Mn) accumulated in the leaves of each type of plant. It was recorded in the resent study four genera of plants ( Acacia , Alkonukiyrs , eucalyptus andDodenia) and given the symbols A, B, C and D , respectively), the results show the superiority leaves (B) in the deposition of particles of airborne dust where recorded 3168.50 and 1581.86 Mikgm/cm2 paper , followed by leaf (D) 1630, and 1562.06 Mikgm /cm2 and then leaves (C) 1254.82 and 1317.83 Mikgm / cm2 , followed by leaf (A) and recorded 581.25 and 1071.87 Mikgm/cm2 weight dry and wet respectively . As for the accumulation of heavy metals (lead , cadmium , selenium , chromium , cobalt , tin , iron , zinc , and manganese ), the results show that the plant (A ) had the highest capacity in the accumulation of most of the elements studied , followed by the plant (C) and plant (D ) and leaf (B). was the order of items cumulatively in plants follows : Fe > Se > Zn >Mn> Cu> As >Pb> Co > Cd > Cr, as recorded rates respectively ( 95.4 , 58.2 , 32.5 , 31.8 , 10 , 6.2 , 1.72 , 1.67 , 1.43 and 0.32 Mikgm /cm2
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan
This thesis was aimed to study gas hydrates in terms of their equilibrium conditions in bulk and their effects on sedimentary rocks. The hydrate equilibrium measurements for different gas mixtures containing CH4, CO2 and N2 were determined experimentally using the PVT sapphire cell equipment. We imaged CO2 hydrate distribution in sandstone, and investigated the hydrate morphology and cluster characteristics via μCT. Moreover, the effect of hydrate formation on the P-wave velocities of sandstone was investigated experimentally.
The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreRecent developments in technology and the area of digital communications have rendered digital images increasingly susceptible to tampering and alteration by persons who are not authorized to do so. This may appear to be acceptable, especially if an image editing process is necessary to delete or add a particular scene that improves the quality the image. But what about images used in authorized governmental transactions? The consequences can be severe; any altered document is considered forged under the law and may cause confusion. Also, any document that cannot be verified as being authentic is regarded as a fake and cannot be used, inflicting harm on people. The suggested work intends to reduce fraud in electronic documents u
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show More