Regular sampling for six months from January to July 2012 were taken in small, shallow, perennial, standing ponds near the Greater Zab River, Gwer district, Erbil. A variety of physicochemical parameters were determined. Air and water temperature were falling between 15.2 - 34.7 ? C and 15.5 and 26.5 ?C. The waters are neutral (pH 7.38-8.27), hard, alkaline, salty, high in TDS and EC (892-966?S/cm, and rich in nutrients (NO3: 2.1-4.1mg/l, PO4: 0.33-0.62 mg / l , SO4: 24.7-80.2 mg / l ). The attention fixed on a filamentous blue- green algae Glaucospira Lagerheim, 1982) which is new to Iraqi flora. It is a filament (trichome), solitary, pale or yellowish blue – green, without sheath, Screw like coiled, motile, some of them are activ
... Show MoreBackground: The main drawback of soft lining materials was that they debonded from the denture base after a certain period of usage. Therefore, the purpose of this research was to determine the impact of oxygen and argon plasma treatment on the shear bonding strength of soft liners to two different kinds of denture base materials: conventional acrylic resin and high impact acrylic resin. Materials and Methods: Heat cure conventional and high impact acrylic blocks (40 for each group) were prepared. A soft liner connected the final test specimen of two blocks of each acrylic material. Shear bond strength (SBS) was assessed using universal testing machine. Additional blocks were also prepared for analyzing Vickers microhardness, contact ang
... Show MoreVitamin D is one of several nutrients essential for calcium metabolism. Body weight status and magnesium may influence vitamin D activity. To determine whether salivary vitamin D, magnesium, and calcium levels are associated with body weight status and dental caries severity in children, this cross‐sectional research was conducted.
The sample consisted of 180 boys aged 6–8 years. According to their body mass index (BMI), children were assigned to three groups of 60 boys (normal weight, overweight, and obese). Moreover,
Successfully, theoretical equations were established to study the effect of solvent polarities on the electron current density, fill factor and efficiencies of Tris (8-hydroxy) quinoline aluminum (Alq3)/ ZnO solar cells. Three different solvents studied in this theoretical works, namely 1-propanol, ethanol and acetonitrile. The quantum model of transition energy in donor–acceptor system was used to derive a current formula. After that, it has been used to calculate the fill factor and the efficiency of the solar cell. The calculations indicated that the efficiency of the solar cell is influenced by the polarity of solvents. The best performance was for the solar cell based on acetonitrile as a solvent with electron current density of (5.0
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MorePolyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More