Due to the deliberate disposal of industrial waste, a great amount of petroleum hydrocarbons pollute the soil and aquatic environments. Bioremediation that depends on the microorganisms in the removal of pollutants is more efficient and cost-effective technology. In this study, five rhizobacteria were isolated from Phragmites australis roots and exposed to real wastewater from Al-Daura refinery with 70 mg/L total petroleum hydrocarbons (TPH) concentration. The five selected rhizobacteria were examined in a biodegradation test for seven days to remove TPH. The results showed that 80% TPH degradation as the maximum value by Sphingomonas Paucimobilis as identified with Vitek® 2 Compact (France).
Background: Folic acid (vitamin B9) is one of the important vitamins that are necessary for growth and development of the embryo and preventing the occurrence of congenital malformations which are one of the important health problems in the developing countries and the world as it has a direct effect on the affected babies, their families and the community. It affects an estimated 3% of newborns worldwide.Periconceptional supplementation with folic acid (before conception and during the first 12 weeks of pregnancy) was found to decrease many important types of these anomalies. Objectives: The aim of this study is to assess knowledge, attitude and practice of periconceptional use of folic acid in pregnant women who are attending antenatal
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show More