The present study includes the effect of the ethanolic and aqueous extract of Piper nigrum against the third instar of Culex pipiens molestus (Diptera:Culicidae) in different concentrations: 1, 1.5 ppm of ethanolic extracts of Piper nigrum causing 100% mortality of larvae in the second day of treatment, while the concentrations 5% of aqueous extracts of Piper nigrum caused 100% mortality of larvae in the second day of treatment. The concentration 2.5% caused 100% mortality of larvae after four days of treatment. The current study also detected the effect of 0.1% concentration of Piper nigrum aqueous extract. The effect of this concentratio
... Show MoreAbstract
One of the most suitable materials to be used in latent heat thermal energy storage system (LHTES) are Phase change materials, but a problem of slow melting and solidification processes made many researchers focusing on how to improve their thermal properties. This experimental work concerned with the enhancing of thermal conductivity of phase change material. The enhancing method was by the addition of copper Lessing rings in phase change material (paraffin wax). The effect of diameter for the used rings was studied by using two different diameters (0.5 cm and 1cm). Also, three volumetric percentages of rings addition (3%, 6% and 10%) were tested for each diameter. The discharging process was done with
... Show MoreThe research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreAutorías: Wafaa Sabah Mohammed Al-Khafaji, Fatimah Hameed Kzar Al-Masoodi, Suadad Ibrahim Suhail Al-Kinani. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2023. Artículo de Revista en Dialnet.
Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreThis paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More