Preferred Language
Articles
/
moaio4YBIXToZYALiJuP
Optimization Kerosene Bio-degradation by a Local Soil Bacterium Isolate Klebsiella pneumoniae Sp. pneumonia
...Show More Authors

Isolated Bacteria from the roots of barley were studied; two stages of processes Isolated and screening were applied in order to find the best bacteria to remove kerosene from soil. The active bacteria are isolated for kerosene degradation process. It has been found that Klebsiella pneumoniae sp. have the highest kerosene degradation which is 88.5%. The optimum conditions of kerosene degradation by Klebsiella pneumonia sp. are pH5, 48hr incubation period, 35°C temperature and 10000ppm the best kerosene concentration. The results 10000ppm showed that the maximum kerosene degradation can reach 99.58% after 48 h of incubation. Higher Kerosene degradation which was 99.83% was obtained at pH5. Kerosene degradation was found to be maximum at 35°C with 98.63%, where 10000ppm kerosene showed the highest degradation at 99.527%. The results indicate that the isolated Klebsiella pneumonia sp. is extremely efficient in degrading kerosene hydrocarbons.

Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS: SUBSTITUTION OF ANIMAL PROTEIN BY DIFFERENT ATION OF DRIED RUMEN MEAL IN COMMON CARP Cyprinus carpio DIETS
...Show More Authors

The study was conducted to show the effect of using dried rumen powder as a source of animal protein in the diets of common carp (Cyprinus carpio L.) on its performance, in the fish laboratory/College of Agricultural Engineering Sciences/University of Baghdad/ for a period of 70 d, 70 fingerlings were used with an average starting weight of 30±3 g, with a live mass rate of 202±2 g, randomly distributed among five treatments, two replicates for each treatment and seven fish for each replicate. Five diets of almost identical protein content and different percentages of addition of dried rumen powder were added. 25% was added to treatment T2 and 50% to treatment T3 and 75% of the treatment T4 and 100% of the treatment T5

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SEPARATION OF PROTEIN AND LACTOSE FROM WHEY DISPOSED FROM ABO-GHRAAB DAIRY FACTORY BY USING MEMBRANE TECHNOLOGY: SEPARATION OF PROTEIN AND LACTOSE FROM WHEY DISPOSED FROM ABO-GHRAAB DAIRY FACTORY BY USING MEMBRANE TECHNOLOGY
...Show More Authors

In this research, the performance of a two kind of membrane was examined to recovering the nutrients (protein and lactose) from the whey produced by the soft cheese industry in the General Company for Food Products inAbo-ghraab.Wheyare treated in two stages, the first including press whey into micron filter made of poly vinylidene difluoride (PVDF) standard plate type 800 kilo dalton, The membrane separates the whey to permeate which represent is the main nutrients and to remove the fat and microorganisms.The second stage is to isolate the protein by using ultra filter made of polyethylsulphone(PES)type plate with a measurement of 10,60 kilo dalton and the recovery of lactose in the form of permeate.
The results showed that the percen

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings
...Show More Authors

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Diet and orthodontics- A review
...Show More Authors

During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Politeness: A Socio- Pragmatic Study
...Show More Authors

The most influential theory of ‘Politeness’ was formulated in 1978 and revised in 1987 by Brown and Levinson. ‘Politeness’, which represents the interlocutors’ desire to be pleasant to each other through a positive manner of addressing, was claimed to be a universal phenomenon. The gist of the theory is the intention to mitigate ‘Face’ threats carried by certain ‘Face’ threatening acts towards others.

            ‘Politeness Theory’ is based on the concept that interlocutors have ‘Face’ (i.e., self and public – image) which they consciously project, try to protect and to preserve. The theory holds that various politeness strategies are used to prot

... Show More
View Publication Preview PDF
Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
(دراسة تحليلية): ( A field study )
...Show More Authors

The research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.

This research is considered an analytical study by using survey study for 111 items and the results for the study as following:

1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55

2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 09 2016
Journal Name
Advances In Environmental Biology
A study effect Histological changes
...Show More Authors