Duration of each developmental stage of the house dust mite Dermatophagoides pteronyssinus together with the mortality percentage were observed at a combination of five different temperatures namely 20C°, 22.5C°, 25C°, 27.5C° and 30C° and four different humidities namely 55%, 75%, 85% and 95% r. h. Results showed that temperature had the greatest effect on the life cycle period. The higher the temperature the shorter the life cycle was aid versa verea. On the other hand, humidity seems to be less effectiveness, though at the higher temperature and humidity no development was occured. Mortality among all temperatures and humidities appeared nearly the same, but at higher temperature and higher humidity and because of mould growth high mortality occured. High mortality occured at the egg or larval stage, protonymph and tritonymph had low mortality percentage. All data were discussed statically to show the significant differences if present.
The nanostructured MnO2 /carbon fiber (CF) composite electrode was prepared using the anodic electrodeposition process. The crystal structure and morphology of MnO2 particles were determined with X-ray diffraction and field-emission scanning electron microscopy. The electrosorptive properties of the prepared electrode were investigated in the removal of cadmium ions from aqueous solution, and the effect of pH, cell voltage, and ionic strength was optimized and modeled using the response surface methodology combined with Box–Behnken design. The results confirm that the optimum conditions to remove Cd(II) ions were: pH of 6.03, a voltage of 2.77 V, and NaCl concentration of 3 g/L. The experimental results showed a good fit for the Freundli
... Show MoreThis study aims to identify the level of application of blue ocean leadership activities in public organizations and to build a conceptual and cognitive framework around this concept. The study adopted a descriptive-analytical approach, and the research sample consisted of (95) individuals from the senior management working at the center of the Iraqi Ministry of Communications (director general, department manager, section head). The data analysis technique used is structural equation modeling (SEM) and the Statistical Package for the Social Sciences (SPSS). The results indicate that the senior management in the Ministry of Communications is working to adopt the blue ocean leadership style through its activities, but not to the leve
... Show MoreOBJECTIVE: To determine the preferred specialties of graduated medical doctors working in Basra, and determine the factors behind their preferences. METHODS: The study was conducted in 38 primary health care centres and seven hospitals in Basra from January-June 2014. A cross-sectional study was adopted with the use of a self-administered questionnaire form. Two hundred ninety six graduated doctors were agreed to participate. Chisquare test and logistic regression were used to test the association between deciding a future speciality and influencing factors. RESULTS: The most preferred specialties were radiology and ultrasound, gynaecology and obstetrics, surgery, internal medicine, dermatology and paediatrics. Clinical specialties were sta
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.