Preferred Language
Articles
/
bsj-7457
Using microalga Coelastrella sp. to remove some nutrients from wastewater invitro
...Show More Authors

Microalgae have been increasingly used for wastewater treatment due to their capacity to assimilate nutrients. Samples of wastewater were taken from the Erbil wastewater channel near Dhahibha village in northern Iraq. The microalga Coelastrella sp. was used in three doses (0.2, 1, and 2g. l-1) in this experiment for 21 days, samples were periodically (every 3 days) analyzed for physicochemical parameters such as pH, EC, Phosphate, Nitrate, and BOD5, in addition to, Chlorophyll a concentration. Results showed that the highest dose 2g.l-1 was the most effective dose for removing nutrients, confirmed by significant differences (p≤0.05) between all doses. The highest removal percentage was recorded for ammonium pass 96% followed by NO3 with 95%, while BOD5 ranged from 88.7 to 93.5%. Decreases in nutrients coincided with an increase in chlorophyll-a content with the highest biomass on the 17th day of the experiment reaching 1.43 mg. l-1.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Biogas Production by Anaerobic Digestion of Date Palm Pulp Waste
...Show More Authors

The purpose of this preliminary study is to verify the possibility of using Iraqi Zahdi date palm biomass as a resource for biogas production, methane in particular using thermophilic anaerobic digestion with waste water treatment activated sludge. Moreover, is to investigate the influence of extra nutrients addition to the digestion mixture. Biogas was captured in sealed jars with remote sensing modules connected to computer with integrated program to record the gas pressure continuously. A total gas pressure with 67% Methane was produced from date pulp waste fermentation with a yield of 0.57 Lit for each gram volatile solid of substrate. Addition of 1% yeast extract solution as nutrient increased Methane yield in liters by 5.9%. This i

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Psychometric Properties of the Arabic Version of Nomophobia Scale among Omani Youth
...Show More Authors

The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
T-Essentially Coretractable and Weakly T-Essentially Coretractable Modules
...Show More Authors

        A new generalizations of coretractable modules are introduced where a module  is called t-essentially (weakly t-essentially) coretractable if for all proper submodule  of , there exists f End( ), f( )=0 and Imf tes  (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 07 2019
Journal Name
Arab Science Heritage Journal
دراسة التغيرات المرضية النسجية الناتجة من تلوث أعلاف الدواجن
...Show More Authors

     هدف الدراسة معرفة التأثير السمي التراكمي للأعلاف الملوثة بالحنطة المتفحمة على أفراخ فروج اللحم .اجري هذا البحث في مختبرات الصحة الحيوانية التابعة لوزارة العلوم والتكنولوجيا استعمل 78 فرخاً لهذه التجربة قسمت إلى ستة مجاميع ربيت في أقفاص خاصة أعدت لهذا الغرض. تم تغذيتها يوميا على أعلاف ملوثة حسب برامج التغذية المتبعة , تمثلت المجموعة الأولى بمجموعة السيطرة والتي غذيت على عليقه تحوي الحنطة

View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2006
Journal Name
Political Sciences Journal
ملامح من فكرة القانون الطبيعي في حضارة العراق القديم
...Show More Authors

ملامح من فكرة القانون الطبيعي في حضارة العراق القديم

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 10 2022
Journal Name
مجلة جامعة الزيتونة
المجابهة الوقائية وعلاقتها بالتمكين النفسي لدى المتعافين من الادمان  
...Show More Authors

المستخلص : هدفت البحث الحالي إلى بناء برنامج التدخل المبكر نموذج مجموعة المهارات الاجتماعية الفورد بيكر على وفق أساليب معرفية سلوكية، والتعرف على اثر البرنامج في خفض التوحد الافتراضي لدى الأطفال والتحقق من هذا الهدف وضعت الباحثة الفرضية الآتية لا توجد فروق ذو دلالة إحصائية بين متوسط رتب درجات أفراد المجموعة التجريبية في التطبيقين القبلي والبعدي على المقياس (CARS2-QPC). وقد اقتصر البحث الحالي على الأطفال من ذوي

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Measurement of Uranium Concentrations in soil of some regions in south east of Baghdad using nuclear track detector (CR-39)
...Show More Authors

???? ?? ??? ????? ???? ?????? ?????????? ????? ??????? ???? ?????? ????? ??? ??? ????? ?? ???? ??? ????? ????? ???? ????? ????? ?? 0-3cm, 10cm, 20cm, 30cm, 40cm ???????? ????? ?? ???? ????? ???????? ?? ???? ????? ?????? CR-39??????? ?? ??? ??? ?????????? ???????????? ???????? ???? n.cm-2.s-1 5 x 103?? ?????? ?????????? Am241- Be??? ???? ??????? ????????? ??? ?? ???? ????? ?????????? ??? ?? ????? ??????? ?????? 0.881±0.086??? ?? ??????? ????? ??? ????? ??? ?? ????? ????? ??? ???????? ???0.441±0.036 ??? ?? ???????

View Publication Preview PDF
Crossref (1)
Crossref