In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.
Metal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show MorePlant regeneration protocols were developed for medicinally important anise (Pimpinella anisum L.) that successfully achieved from seeds. Seeds were sterilized and inoculated on Murashige and Skoog (MS) medium with and without gibberellins (GA3) until full germination. The highest percentage of germination (100%) was recorded on MS medium treated with 2.0 mg/L GA3 after 7 days. For shoot proliferation, different concentrations of 6- benzyl adenine BA (1, 1.5, 2 mg/L) were used. To enhance shoot induction, 0.1 mg/L of naphthalene acetic acid (NAA) and 0.01 mg/L of thidiazuron (TDZ) were tested along with BA. Direct regenerated shoots were obtained on MS medium supplemented with BA alone (2mg/L) which gave (7shoot/explant), while the presence
... Show MoreThe research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and
A microbial study conducted for a number of flour samples (30 samples) Uses in the bakery ovens in various areas of the city of Baghdad, by used the conventional methods used in laboratories in microbial tests and compared with the modern techniqueby usedof BacTrac Device 3400 equipped from SY-LAB Impedance analysersAustrian company.The results of two ways showed (The conventional way and BacTrac Device test)that the total counts of aerobic bacteria, coliform bacteria, StaphylococcusSpp. bacteria, Bacillus cereus bacteria and yeasts and molds,Most of them were within the permissible borders in the Iraqi standard for grain and its products With free samples from SalmonellaSpp. bacteria, and that the screening by BacTrac device are shorten
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The Yemen Kings and gaverners allered notable services to the pilgrims, who
were in their way to perform the pilgrimage to Mecca. Among them Al-Hysen Ibn
Salama (dead 384, Aih). The governer of Al- Zeadiea state, who concern about
pilgrimage route from its beginning at Hudrumot to its end at Mecca Al Makruma, the
distant was estimated by 60th days to pass the way he also eastablished asystem of
water “artesian wells” as long as the pilgrimage way also setting up large Mosqeses
and Marking out the way of the caravans of pilgrimage to save these caravans from
lossing the right way, he setting up under ground water chanal started from Arafat to
holy Mecca in order to ensure water supplies for the erea. This proje
One of the challenging issues encountered during drilling operations is the lost circulation. Numerous issues might arise because of losses, such as wasting of time and higher drilling cost. Several types of lost circulation materials have been developed and are being used to limit mud losses and avoid associated issues. Each solution has benefits and drawbacks.
In this study, a core flooding test was performed to study the effectiveness of polyacrylamide (PAM) granular gel on the reduction of the circulation lost. One common type of fracture characteristic is fractures with tips, commonly known as partially open fracture (POF). However, PAM gel therapy in POFs received little attention in prior research. Models of partly open fra
... Show MoreThis Action research aimed at Assisting Students of Faculty of Educational Sciences at Al-Quds Open University to design computerized lessons using the Power Point software and according to ADDIE model. The study sample consisted of 40 students who were taking a course titled Technology of Education during the second semester of the 2014-2015 academic year and three academic instructors . To collect the required date , the researchers used focus group technique and structured interviews to get information from the 40 students and the three academic instructors involved in the course Technology of Education in QOU /Nablus Branch. In addition to these methods, a workshop with a guiding checklist was employed t
... Show More