I
In this study, optical fibers were designed and implemented as a chemical sensor based on surface plasmon resonance (SPR) to estimate the age of the oil used in electrical transformers. The study depends on the refractive indices of the oil. The sensor was created by embedding the center portion of the optical fiber in a resin block, followed by polishing, and tapering to create the optical fiber sensor. The tapering time was 50 min. The multi-mode optical fiber was coated with 60 nm thickness gold metal. The deposition length was 4 cm. The sensor's resonance wavelength was 415 nm. The primary sensor parameters were calculated, including sensitivity (6.25), signal-to-noise ratio (2.38), figure of merit (4.88), and accuracy (3.2)
... Show MoreFree water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake). In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and
... Show MoreThis study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected
... Show MoreThe phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show Morehe study aimed to purify of Leucine aminopeptidase (LAP) from sera of hyperthyroidism patients and its relation to some thyroid hormones (TSH, T 3 , T 4 ) of subclinical hyperthyroidism and hyperthyroidism patients with lipid peroxidation levels that may be play a role in this diseases. Specimens were collected during the time from Nov 2017 until Jan 2018 from Endocrine and Diabetes Center, blood samples were collected from fifty healthy control and one hundred patients, patients were divided into two groups consisted of (50) with hyperthyroidism and (50) with subclinical hyperthyroidism. The aged for all subjects ranged (15-60) years with body mass ranged ((25- 29) kg/m 2 . The purification is done by addition of ammonium sulfate, dial
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe study was conducted to identify the toxicity of chromium on scenedesmus quadricauda algae alone and in the presence of nutrient metal (Nitrogen). Different concentrations of chromium (0.5, 1.5 , 2.5, 3.5 , 4.5mg/L) were used and the presence nitrogen is (5 ,10 ,50 ,100mg/L) on cultur media(chu-10) with used for cultivation of the algae in controlled conditions(25oC , light intensity 380 –?E/m2 /s. The results showed increasing in the toxicity of the metal when is alone , excess of concentrations an time of exposure. The growth rate decreased from 0.44 to 0.06 cell/ hour after 12 day of the biging of the experiment and of concentrate 4.5 mg/L of chromium. The intermediate active concentrations of the chromium(EC50) was increase
... Show More