Aromatic hydrocarbons present in Iraqi national surface water were believed to be raised principally from combustion of various petroleum products, industrial processes and transport output and their precipitation on surface water.
Polycyclic aromatic hydrocarbons (PAHs) were included in the priority pollutant list due to their toxic and carcinogenic nature. The concern about water contamination and the consequent human exposure have encouraged the development of new methods for
PAHs detection and removal.
PAHs, the real contaminants of petroleum matter, were detected in selected sites along Tigris River within Baghdad City in summer and winter time, using Shimadzu high performance liquid chromatography (HPLC) system.
Analysis of samples from selected sites proved that the most abundant component of aromatic hydrocarbons were phenanthrene naphthalene, and acenaphthylene, followed by fluorene, acenaphthene, fluoranthene, benzo (a) pyrene, anthracene. and pyrene were
present in low concentrations ranging in a descending order. Chrysene and benzo (a) anthracene were found in very low concentration.
A laboratory unit was designed to optimize the factors which may influence the feasibility of degradation processes of naphthalene and phenanthrene in aqueous matrices by oxidation with Fenton reagent. The study proved that 83% and 79% removal of naphthalene and phenanthrene were achieved applying optimum conditions of pH=3, temperature=40 ° C, H2O2=50 ppm and Fe2+ catalyst = 6 ppm
This research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res
The role of filamentous bacteria represented by Streptomycessp was studied as biological treatment for activated sludge AL- Restomia treatment unit in Baghdad city. The result shows reducing in phosphate concentration where apprise in started entrance the treatment unit 12.083 mg/L fast the unit stages reached to 8.426 mg /L where nitrate concentration apprises 3.59 mg/l and ending in 2.43 mg/L The concentration of ammonia apprises 1358 mg/L and reached to 140 mg/L. also the TDS concentration reduced from 1426 to 1203 mg/L where nutrient which represented (SO4, Mg, Ca, Na, K) reduced by range 30.883- 23.337 , 194- 121 , 440- 321 , 109.03- 101.53 and 16.85- 15.4mg/L respectively COD reduce from427.263- 82mg/L with absorbance0.018- 0.027
... Show More
To identify the importance of the role of succession planning in developing human capital in organizations in light of the accelerating and dynamic events and changes in the work environment, and the research problem indicated the seriousness of employees retiring or leaving their positions for any reason and the extent of its impact on the organization in creating gaps in leadership and problems In managing the talent injection because there will be a shortage of talent, which in turn will affect the general performance of the business in the researched institute, so the importance of research appears in trying to present a set of solutions through which some of the problems facing the organization in quest
... Show MoreThis study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this
... Show MoreSYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2
The research aims to test the two characteristics of the relationship between accounting profits and the stock returns, to find out the suitability of both of them in explaining the relationship between accounting profits and stock returns for joint stock companies registered in the Baghdad Stock Exchange, also aims to reaching the most appropriate specification for the relationship between the two variables of the company’s stock dealing in the Baghdad Stock Exchange, and get a set of results, the most important of which are: the ability of changing for both of these variables in the profits share and the stock level of the profits does not explain more than 9,9% of the market returns of the Iraqi Joint Stock Companies registered i
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More