The twelve samples of agricultural soils from four regions in Al-Najaf governorate with sampling plant with soil. Physical properties of the soil where studied, such as electrical conductivity ranged from (136.33-1070.00)μS/cm-3, and moisture which ranged between the values (0.39-36.48)%. The chemical analysis of the soil have included the proportion of calcium carbonate the ratio between (44.00-48.00%) has been observed increasing amounts of calcium carbonate in surface models. The pH where results indicate that pH values were close to study models ranged between (6.88-7.42) these values generally within the normal range for the measured pH values of the Iraqi soil. The amount of gypsum ranged between the (1.36-4.32meq/100g) proportion of organic matter in the soils studied models was high compared with the percentage of which is supposed to good soils for plant growth and the extent of the proportion of organic matter between (3.31-30.22%). As well as the estimation of heavy metals in the soil, samples were arranging as follows: (Fe> Cr>Mn> Zn>Pb> Cu> Cd). As arranged in the plant as follows: Fe>Mn>Pb> Zn> Cr> Cu> Cd.
Abstract: In the current research the absorption and fluorescence spectrum of Coumarin (334) and Rhodamine (590) in ethanol solvent at different concentration (10-3, 10-4, 10-5) M had been studied. The absorption intensity of these dyes increases as the Concentration increase in addition to that the spectrum was shifted towards the longer wavelength (red shift). The energy transfer process has been investigated after achievement this condition. The fluorescence peak intensity of donor molecule was decrease and its bandwidth will increases on the contrary of the acceptor molecule its intensity increase gradually and its bandwidth decreases as the acceptor concentration increase.
Abstract: In this work we demonstrate and investigate the optical pulse propagation in a photonic band gap fiber Bragg grating (FBG). The light propagates in opposite direction in FBG is explained and discussed by a Coupled Mode Theory (CMT). The photonic band gap (stop band gap) is created by fabricated, a Bragg grating in optical fiber. The results show the pulse spectrum falls entirely within the stop band gap, the entire pulse is reflected by the grating, while when the pulse spectrum is outside the stop band gap the pulses will transmitted through the grating. The group velocity (VG) becomes zero at the edges of the stop band and group velocity dispersion β2 is anomalous on the shorter side of stop band gap whereas β2 for uniform fi
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreSimple method has been used to determine the absence of heavy metals in an aqueous solution. Fluorescein was used as the base colorimetric materialThis was doped with CuCl2 and the final solution showeda clear change in color. This change was correlated with the change in both pH and electrical conductivity of the solution. The optical property as an obvious change of the spectra was observed. Therefore, this simple method could be proposed as a method to detectheavy metals in any solution.
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreVehicle Air Conditioning (AC) systems are used in countries that suffer high temperature degrees during the summer season, one of these countries is Iraq. Most passengers suffer manifestations which may lead to Allergic or Respiratory diseases as they inhale polluted air produced by AC systems.
In this study 10 vehicle were selected randomly on the basis of noxious odors emitted from AC systems. Indoor air samples were collected by using impaction method and using Sabouraud's dextrose agar to grow and isolate dominant fungi species accompanied with AC polluted air. Dust particle diameters aggregated in AC filters were measured because the particles work as transporters to carry fungi then get inhaled by the passengers. After isolating
This study aims to evaluate the concentration of the heavy metals (Co, Cd, Cr, Cu, Ni, Pb, and Zn) and their ecological risk in soils adjacent to the power generators of Ramadi city, Iraq. The soil samples were collected from a depth of 20cm. The obtained results showed that the mean concentrations of heavy metals (HMs) are ranked as in the following order: Cr (360.90mg/kg) > Ni (283.65mg/kg) > Zn (190.96mg/kg) > Pb (130.75 mg/kg) > Cu (36.54 mg/kg) > Co (16.62 mg/kg) > Cd (2.55 mg/kg). The mean values of HMs concentration exceed the international guidelines. The result of correlation matrix analysis at P £ 0.05 showed significant correlations between the concentrations of HMs. These correlatio
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreRivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show More