This study presents a detailed morphology and taxonomic study of Polysiphonia subtilissima collected from Abdul Rehman Goth, Karachi coast, Pakistan. Polysiphonia is a filamentous heterotrichous red algae, characterized by its branching structures and attachment mechanisms. P. subtilissima is notable for its broad salinity tolerance and wide distribution across marine and freshwater ecosystems. This research provides an in-depth examination of the internal and external structures of P. subtilissima, contributing to its systematic study and documenting its first recorded occurrence in Pakistani coastal areas, bordering the northern Arabian Sea. The findings enhance the understanding of the species taxonomy and its ecological role in
... Show MoreMicrowave heating is caused by the ability of the materials to absorb microwave energy and convert it to heat. The aim of this study is to know the difference that will occur when heat treating the high strength aluminum alloys AA7075-T73 in a microwave furnace within different mediums (dry and acidic solution) at different times (30 and 60) minutes, on mechanical properties and fatigue life. The experimental results of microwave furnace heat energy showed that there were variations in the mechanical properties (ultimate stress, yielding stress, fatigue strength, fatigue life and hardness) with the variation in mediums and duration times when compared with samples without treatment. The ultimate stress, yielding stress and fatigue streng
... Show MoreIn study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
In this paper we estimate the coefficients and scale parameter in linear regression model depending on the residuals are of type 1 of extreme value distribution for the largest values . This can be regard as an improvement for the studies with the smallest values . We study two estimation methods ( OLS & MLE ) where we resort to Newton – Raphson (NR) and Fisher Scoring methods to get MLE estimate because the difficulty of using the usual approach with MLE . The relative efficiency criterion is considered beside to the statistical inference procedures for the extreme value regression model of type 1 for largest values . Confidence interval , hypothesis testing for both scale parameter and regression coefficients
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure