A comparative study was carried out on ecological and genetical adaptation of three Iraqi
freshwater snails, Physa acuta, Melanopsis buccinoidea and Melanoides tuberculata, in
respect to acute toxicity of heavy metals (Zn, Cd and Hg). Longevity are used as poisoning
tolerance criterion. LT 50 and LT 100 were determined for the studied snails at (0.5, 1, 5, and
10 ppm), for the three metals. Results indicated that Physa acuta had a higher tolerance than
Melanopsis buccinoidea and Melanoides tuberculata, which was the lower one. Previous
exposure to heavy metals in the original habitat was affecting on experimental tolerance and
no relationships of physical and chemical factors (total hardness, temperature, D. O. and
sulphate) between original and experimental exposuring has been occurred. Results indicated
no ability of the three species for genetical adaptation on experimental bioassays, except for
lower concentrations (0.5, 1 ppm), since Physa acuta managed to give more than two healthy
new generations, whereas Melanopsis buccinoidea was disabled to give more than one
weakling generation.The species Melanoides tuberculata showed a complete disability to give
any generation . The present study suggested a new wide experiment to be design, not only
by acute toxicity but with chronic toxicity, in order to determine the interference between the
ecological and genetical adaptation and the previous exposure to many environmental
pollutants.
Bootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show More
The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each
... Show MoreMonitoring lotic ecosystems is vital for addressing sustainability issues. The Al-Shamiyah River is the primary source of water for various daily activities in the Al-Shamiyah district. This study assessed the pollution levels of the river by measuring the concentration and distribution of heavy metals—specifically chromium, cadmium, manganese, copper, zinc, and lead—in both the river's water and sediments. The concentrations of heavy metals in the water ranged from 0.05 to 1.44µg/ L for copper (Cu), 1.57 to 7.25µg/ L for manganese (Mn), 0 to 1.7µg/ L for cadmium (Cd), 0.02 to 1.33µg/ L for lead (Pb), 0.08 to 2.74µg/ L for zinc (Zn), and 0.44 to 1.84µg/ L for chromium (Cr). In the particulate phase, the concentrations ranged from
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
This study was conducted in a lath house, Dept of Hort. and Landscape, College of Agricultural Engineering Sciences, Univ. During the 2021 growing season, Baghdad will investigate the influence of organic and Biological fertilizers on three Citrus rootstocks' growth and leaf mineral content. The first factor is the addition of liquid organic fertilizers Vit-Org (O) at three levels without addition (O0), soil addition at 10 ml.L-1 (O10) and soil addition at 20 ml.L-1 (O20). The second factor is the addition of nitrogen-fixing bacteria without addition (N1), add 30 ml.Transplant-1 of Azotobacter chroococcum (N2) and add 30 ml.Transplant-1 of Azospirillum brasilemse (N3). The third factor is three citrus rootstocks: sour orange (R1), R
... Show MoreThe marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreDBN Rashid, Al- Utroha Journal, 2018