Abstract. Hassan FM, Mahdi WM, Al-Haideri HH, Kamil DW. 2022. Identification of new species record of Cyanophyceae in Diyala River, Iraq based on 16S rRNA sequence data. Biodiversitas 23: 5239-5246. The biodiversity and water quality of the Diyala River require screening water in terms of biological contamination, because it is the only water source in Diyala City and is used for many purposes. This study aimed to identify a new species record of Cynaophyceae and emphasize the importance of using molecular methods beside classic morphological approaches, particularly in the water-shrinkage-aqua system. Five different sites along Diyala River were selected for Cyanophyceae identification. Morphological examination and 16S rRNA sequence analysis was conducted, and the phylogenetic tree was constructed using Mega 6 Programme. The morphological examination of samples showed a total of 28 species corresponds to Cyanophyceae, including one species of Spirulina. In our study of 28 identified species, three new species record were identified in Diyala River. The newly recorded species were confirmed by 16S rRNA and the phylogenetic tree construction. The species are registered in the National Centre for Biotechnology Information (NCBI) with the following accession numbers: Arthrospira indica (MW854667.1), Arthrospira platensis (MW854665.1), and Limnospira fusiformis (MW854666.1). Most notably, Arthrospira platensis is not listed in the checklist of Iraqi algae. Thus, these species are considered as a new record of Iraqi algal flora. The identification of new species record in Diyala River reflexes the impact of climate change on this river, and the necessity to use 16S rRNA to identify microalgae in all ecosystems.
Tigris River is the lifeline that supplies a great part of Iraq with water from north to south. Throughout its entire length, the river is battered by various types of pollutants such as wastewater effluents from municipal, industrial, agricultural activities, and others. Hence, the water quality assessment of the Tigris River is crucial in ensuring that appropriate and adequate measures are taken to save the river from as much pollution as possible. In this study, six water treatment plants (WTPs) situated on the two-banks of the Tigris within Baghdad City were Al Karkh; Sharq Dijla; Al Wathba; Al Karama; Al Doura, and Al Wahda from northern Baghdad to its south, that selected to determine the removal efficiency of turbidity and
... Show MoreFor the past few years, the sediment began to accumulate in Al-Gharraf River which reduces the flow capacity of the River. In the present research, a numerical model was developed using Hec-Ras software, version 5.0.4. to simulate the flow and sediment transport in the upper reach of the river. The hydrological and cross-section data measured by the Ministry of Water Resources, for the reach located between Kut and Hai cities and having a length of 58200 m, was used to perform calibration and verification of the model. Moreover, field sampling of suspended and bed loads was gathered for five months starting from 7/2/2019, and laboratory tests of samples were conducted to be used as in
Water drainage pattern in the rivers and changed the nature of the renewed feeding areas
in the basin in terms of topographic and geological conditions and climate in addition to the
human role in organizing the process flow within these basins. This study addressed the
development of the Tigris River Hydrological in the city of Baghdad and found that the
annual rate of water drainage in the Tigris River was driven down very significantly,
especially in the past twenty years, and since 1996 up to 2014 record flow rates of less than
the overall rate of discharge of water, a (950 m3 / s ), in addition to the quarterly decrease the
discharge rates, especially since the beginning of the year 2000 and took converge all fo
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element
... Show MoreThe Political loyalties of the individual considered as the most important democracies through direct psychological identification in a particular party. The political parties regarded as the important elements and the foundations of the democratic system. They have effective interaction between the voters and the government institutions. The aim of the current research is to identify the quality of Islamic, the Civilian parties, and the most preferred for students. also, the research attempt to identify the level of identification party that the university students have, and the difference of identification party according to the gender (male, female), the difference of of social class (upper, middle, poor). The sample
... Show MoreAbstract
The current research sought to demonstrate the effect of material flow cost accounting on reducing products through the application of material flow cost accounting technique, which works on the optimal utilization of materials and energy and the reduction of environmental impacts.The research aims to clarify the knowledge foundations for material flow cost accounting, in addition to studying the material flow cost accounting technique that helps reduce the cost of products and make them environmentally friendly. To achieve this, the research relied on the descriptive approach with regard to the theoretical aspect of the resea
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More