The twelve samples of agricultural soils from four regions in Al-Najaf governorate with sampling plant with soil. Physical properties of the soil where studied, such as electrical conductivity ranged from (136.33-1070.00)μS/cm-3, and moisture which ranged between the values (0.39-36.48)%. The chemical analysis of the soil have included the proportion of calcium carbonate the ratio between (44.00-48.00%) has been observed increasing amounts of calcium carbonate in surface models. The pH where results indicate that pH values were close to study models ranged between (6.88-7.42) these values generally within the normal range for the measured pH values of the Iraqi soil. The amount of gypsum ranged between the (1.36-4.32meq/100g) proportion of organic matter in the soils studied models was high compared with the percentage of which is supposed to good soils for plant growth and the extent of the proportion of organic matter between (3.31-30.22%). As well as the estimation of heavy metals in the soil, samples were arranging as follows: (Fe> Cr>Mn> Zn>Pb> Cu> Cd). As arranged in the plant as follows: Fe>Mn>Pb> Zn> Cr> Cu> Cd.
Hematological parameters were used as a biomarker of sub chronic effect of dursban in Cyprinus carpio L. The common carp was exposed sub chronically to the 36, 53,113 µg /l concentrations of dursban for six weeks. During the experimental period the results showed a decrease in the red blood cell (RBC), white blood cell (WBC), hemoglobin (Hb), mean corpuscular volume (MCV), and packed cell volume (PCV) in the last two weeks of exposure, while the Mean corpuscular hemoglobin (MCH) and Mean corpuscular hemoglobin concentration (MCHC) were significantly increased. The present study indicates that sub chronic exposures of C.carpio to dursban alter the hematological parameters.
This study aimed at identifying the trend to applying the Joint Audit as an approach to improve the financial reports quality with all their characteristics (Relevance, Reliability, Comparability, Consistency), as well as enclose the difficulties that faced the auditors in the Gaza Strip in implementing the Joint Audit. In order to achieve the study aims, a measure was used to identify the trend to apply the Joint Audit and it was distributed to the study sample which is consisting of (119) individuals and retrieved thereof (99) valid for analysis, approximately (83.2%), (69) of them are Auditors, (30) financial managers and accountants. The researcher used the analytical descriptive method, and after analyzing the results, the s
... Show MoreAbstract: In the current research the absorption and fluorescence spectrum of Coumarin (334) and Rhodamine (590) in ethanol solvent at different concentration (10-3, 10-4, 10-5) M had been studied. The absorption intensity of these dyes increases as the Concentration increase in addition to that the spectrum was shifted towards the longer wavelength (red shift). The energy transfer process has been investigated after achievement this condition. The fluorescence peak intensity of donor molecule was decrease and its bandwidth will increases on the contrary of the acceptor molecule its intensity increase gradually and its bandwidth decreases as the acceptor concentration increase.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreAbstract: In this work we demonstrate and investigate the optical pulse propagation in a photonic band gap fiber Bragg grating (FBG). The light propagates in opposite direction in FBG is explained and discussed by a Coupled Mode Theory (CMT). The photonic band gap (stop band gap) is created by fabricated, a Bragg grating in optical fiber. The results show the pulse spectrum falls entirely within the stop band gap, the entire pulse is reflected by the grating, while when the pulse spectrum is outside the stop band gap the pulses will transmitted through the grating. The group velocity (VG) becomes zero at the edges of the stop band and group velocity dispersion β2 is anomalous on the shorter side of stop band gap whereas β2 for uniform fi
... Show MoreSimple method has been used to determine the absence of heavy metals in an aqueous solution. Fluorescein was used as the base colorimetric materialThis was doped with CuCl2 and the final solution showeda clear change in color. This change was correlated with the change in both pH and electrical conductivity of the solution. The optical property as an obvious change of the spectra was observed. Therefore, this simple method could be proposed as a method to detectheavy metals in any solution.
Vehicle Air Conditioning (AC) systems are used in countries that suffer high temperature degrees during the summer season, one of these countries is Iraq. Most passengers suffer manifestations which may lead to Allergic or Respiratory diseases as they inhale polluted air produced by AC systems.
In this study 10 vehicle were selected randomly on the basis of noxious odors emitted from AC systems. Indoor air samples were collected by using impaction method and using Sabouraud's dextrose agar to grow and isolate dominant fungi species accompanied with AC polluted air. Dust particle diameters aggregated in AC filters were measured because the particles work as transporters to carry fungi then get inhaled by the passengers. After isolating
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreThis study aims to evaluate the concentration of the heavy metals (Co, Cd, Cr, Cu, Ni, Pb, and Zn) and their ecological risk in soils adjacent to the power generators of Ramadi city, Iraq. The soil samples were collected from a depth of 20cm. The obtained results showed that the mean concentrations of heavy metals (HMs) are ranked as in the following order: Cr (360.90mg/kg) > Ni (283.65mg/kg) > Zn (190.96mg/kg) > Pb (130.75 mg/kg) > Cu (36.54 mg/kg) > Co (16.62 mg/kg) > Cd (2.55 mg/kg). The mean values of HMs concentration exceed the international guidelines. The result of correlation matrix analysis at P £ 0.05 showed significant correlations between the concentrations of HMs. These correlatio
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More