A series of experiments were conducted for the first time in Iraq to evaluate the efficiency of five plant leaves extracts (Ibicella lutea, Nerium oleander, Clerodendron inerme, Allium cepa and Eucalyptus spp.) in treating the common carp (Cyprinus carpio) infected with monogenetic trematodes of genera Dactylogyrus. Five different concentrations of such extracts were used to bathe fishes for 5,10,15,20 and 25 minutes. A concentration of 15% A. cepa for 25 minutes of bath exposure was affective in trematode eradication. Extracts of both Eucalyptus and N. oleander at a concentration of 10% each were also affective for ten minutes exposure. Extracts of C. inerme had no any effect on such parasites. On the otherhand, extracts of 1. hitea caused
... Show MoreWere arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution to chose the suggested market to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms
... Show MoreThe main parameter that drives oil industry contract investment and set up economic feasibility study for approving field development plan is hydrocarbon reservoir potential. So a qualified experience should be deeply afforded to correctly evaluate hydrocarbons reserve by applying different techniques at each phase of field management, through collecting and using valid and representative data sources, starting from exploration phase and tune-up by development phase. Commonly, volumetric calculation is the main technique for estimate reservoir potential using available information at exploration stage which is quite few data; in most cases, this technique estimate big figure of reserve. In this study
In this work a study was made in centrifugal fan blower to investigate the effect of impeller blade design on sound pressure level (SPL). Shroud and unshroud impeller of nine blades are used. The sound generation from flow inside the test rig at different positions was displayed by using spectral analyzer. The experiments were carried out in anechoic chamber with small holes in its walls, under ambient condition about (25-27) C ° to avoid the effect of temperature on the sound pressure level. The results showed that (SPL) decreased with the increase of distance from the source about (3-4)dB when distance varied about (0.8-1.06)m, and the (SPL) decreased with the decrease of velocity about (8-12)dB when velocity varied between (13000-260
... Show MoreThis research studied the relationship of patterns of investigator personality with the big five dimensions (Extraversion, stability, interoperability, openness, and personal benevolent), in facing the job stress with its resources(characteristics of the role, quality of work, organizational structure, work environment, organizational policies, social relations, and organizational processes) which the investigators exposed to it at the General Inspectors Offices.
The researcher derived the idea of research from the importance of the work of these offices in a confrontation of various cases of financial and administrative corruption in Iraq at the present time, since itis one of the most important in
... Show MoreThe study aims to identify the symptoms of PTSD among displaced Yazidi women according to age, marital status, educational level, and type of status (displaced or survivor). The study also seeks to identify the effect of the relaxation program on reducing PTSD among displaced Yazidi women. The research sample included (60) Yazidis for the statistical analysis sample and (5) for the experimental sample in the Dohuk governorate. For achieving the research objectives, a scale was used from the PTSD Checklist for DSM-5 (PCL-5), as well as a relaxation program was prepared. The researchers reached the following results that there is an average level of PTSD symptoms among displaced Yazidi women, there are no statistically significant differen
... Show MoreThis study aim to identify the concept of web based information systems since its one of the important topics that is usually omitted by our organizations, in addition to, designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.
This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat
... Show MoreVehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More