This study was carried out from February to October 2012 in six semi salty ponds in Gwer sub-district which is the first work in the area. A total of 32 species and 2 genera of algae where reported as the new records. Mostly the non diatoms are belonging to Cyanophyta, Chlorophyta, Euglenophyta, Cryptophyta, Chrysophyceae, while diatoms or Bacilariophyceae are belong to pennals- order.
Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
Celery and coriander are vastly applied in modern medicine and traditionally because various medicinal and nutritional benefits depend on their medicinal characteristics. The study aimed to detect, isolate and compare extracts contents of phenolic acids (caffeic and p-coumaric acids) in ethyl acetate fraction of fresh and dry aerial parts of coriander (Coriandrum sativum L.) and celery (Apium graveolens L.) of the Apiaceae family. The extraction of these constituents was carried out by maceration method using 70% ethanol and fractionation was done by using petroleum ether, and ethyl acetate. The existence of caffeic and p-coumaric acids in aerial part extracts of two plants was identified by thin-layer chromatography (TLC) and high-
... Show MoreBackground:Â Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.
Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi
... Show MoreA factorial experiment (2× 3) in randomized complete block design (RCBD) with three replications was conducted to examine the effect of honeycomb selection method using three interplant distances on yield and its components of two cultivars of bean, Bronco and Strike. Interplant distances used were 75× 65 cm, 90× 78 cm, and 105× 91 cm (row× plant) represent short (high plant density), intermediate (intermediate plant density), and wide (low plant density) distance, respectively. Parameters used for selection were number of days from planting to the initiation of first flower, number of nodes formed prior to first flower, and number of main branches. Results showed significant superiority of the Bronco cultivar represented in the number
... Show MoreThe nuclear structure included the matter, proton and neutron densities of the ground state, the nuclear root-mean-square (rms) radii and elastic form factors of one neutron 23O and 24F halo nuclei have been studied by the two body model of within the harmonic oscillator (HO) and Woods-Saxon (WS) radial wave functions. The calculated results show that the two body model within the HO and WS radial wave functions succeed in reproducing neutron halo in these exotic nuclei. Moreover, the Glauber model at high energy has been used to calculated the rms radii and reaction cross section of these nuclei.
Power-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo
... Show MoreThe present study aimed to determine the genetic divergence of seven maize genotypes (Al-Maha, Sumer, Al-Fajr, Baghdad, 5018, 4 × 1 single hybrid, and 4 × 2 single hybrid) under two varied levels of nitrogen fertilization (92 and 276 kg N ha-1). The experiment occurred in 2022 in a randomized complete block design (RCBD) with a split-plot arrangement and three replications at the College of Agricultural Engineering Sciences, University of Baghdad, Iraq. The nitrogen fertilization levels served as main plots, with the maize genotypes allocated as the subplots. The results revealed that genetic variance was higher than the environmental variance for most traits, and the coefficient of phenotypic variation was close to the genetic va
... Show MoreThe particle-hole state densities have been calculated for 232Th in
the case of incident neutron with , 1 Z Z T T T T and 2 Z T T .
The finite well depth, surface effect, isospin and Pauli correction are
considered in the calculation of the state densities and then the
transition rates. The isospin correction function ( ) iso f has been
examined for different exciton configurations and at different
excitation energies up to 100 MeV. The present results are indicated
that the included corrections have more affected on transition rates
behavior for , , and above 30MeV excitation energy
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More