We studied in this research how to find a method of estimating the quantity (Kinetically) of three kinds of Insecticide and their mixture, which are used in agriculture. The extracted insecticide from the polluted samples with these insect from air, soil, and the leaves of trees, have be used into the reaction with H2O2 and benzedine. The kinetic study of this reaction was formed in basic medium,( pH= 8.6), using UV. Spectra at (?= 420nm). The study showed that the reaction is the first order, and the speed of the reaction was used to estimate the concentration of insecticide in solution and mixture. The experiments of this study indicated that this method has the speed and efficiency for quantitatively estimating these insecticides in solution and mixture.
ولاء طارق حميد, Mustansiriyah Journal of Sports Science, 2021
The present paper aims at investigating the linguistic image portrayed by UNICEF reports on the Iraqi child from a critical discourse analysis perspective during Covid19 pandemic (2020). The paper attempts to fill a gap in research literature concerning the linguistic construction of the Iraqi child by the UNICEF reports during the critical health crisis of Covid19. Van Leeuwen’s (2008) approach of social actor representation has been adopted for this purpose. From Van Leeuwen’s approach, the category of determination (single determination and overdetermination) has been selected to be the main analytical tool for its high compatibility with the set of objectives put forward to figure out how such a globally effective and
... Show MoreDeception is an inseparable facet of political discourse in attaining strategic political gains though compromising public opinion. However, the employment of discursive deception strategies by the policy-making institutions of think tanks has not received due attention in the literature. The current study aims at exploring how the ideologizing deception strategies are utilized by the conservative American think tank of the Washington Institute to reproduce socio-political realities and re-shape public opinion. To fulfill this task, van Dijk’s (2000) notion of ideological polarization which shows positive self-representation and negative other representation is adopted to conduct a critical discourse analysis of four Arabic texts relea
... Show MoreSignature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various
... Show MoreThis study aimed to identify the degree of use computers in administrative functions (planning, organization, controlling, and evaluation) among school leaders and assistants in public education schools in Sharoorah governorate ، as well as to identify obstacles of use computers in administrative functions from the perspective of school leaders and assistants male and female in public schools during the academic year 1439-1440, the study sample (66) school leaders and assistants, males (58), a and females (44), , and to answer the questions of the study, the researchers developed a questionnaire consisting of (60) items, has been verified sincerity and persistence, and data analysis was used frequencies, percentages an
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe weight of larvae virgins and Alcamlat for males more than the weight of females of the roles themselves that the highest rate of loss in weight of larvae developed to virgins when field conditions were (21.5,22,21.3) mg during June and July and August respectively, recorded the highest degrees of heat and less attributed to moisture