Background: Tap waters play an important role in fulfilling the people needs for drinking and domestic purposes. Contaminate the tap water with different pollutants has become an issue of great concern for 90% of people who are depended on the tap water as the main source of drinking. Pollutants can make their way easily into the delivering pipes which suffer from the leaking resulting in decreasing the quality of water. Objective: Therefore, assess the water quality for drinking purpose by calculating the water quality index is an important tool to ascertain whether the water is suitable for human consumption or not. Methods: In the present work, the water quality of the Al-Salam, western region of Baghdad city, Iraq was investigated for 7 months (Jan-July 2017). 63 tap water and 7 water station samples were collected and analyzed using standard methods. The index proposed measuring nine parameters which are: TDSs, pH, TH, DO, phosphates, nitrates, temp, BOD5, fecal coliform, turbidity and conductivity. The calculated values of parameters were normalized into the scale (0-100) and converted to the quality rating statements (Excellent, good, medium, bad and very bad). Results: The results show that WQI values of the tap water samples have ranged from 64- 83% while it ranged from 88-94 for the water station samples. Also, it can notice that none of the water samples is recorded WQI=100 during the entire period of the study. The proposed NFS index was able to determine the water quality and it presents an accurate, rapid and modern way to evaluate and monitor the water quality.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Researchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show MoreThe research aimed to demonstrate the possibility of benefiting from the coordination between real estate and income tax as the independent variable on the tax outcome as the dependent variable as the dependent variable. Which were practiced within rented buildings, as information was obtained from real estate owners, and the annual controls for the year 2021 were relied upon in the process of calculating the tax amounts expected to be obtained. used in the tax inventory process lacks seriousness and continuous updating
The role and procedures for accountability in the spending units significant impact in enhancing the results of the budget it is found by studying and comparing the results of the implementation of the budget for the research sample for a period of two years to repeat the same deviations and irregularities of Guanyin, regulations and instructions that have occurred in implementation results and two consecutive Kaltjaoz customizations and low rates of implementation and the lack of exchange of allocations Finance despite the presence budget note that such remarks are always indicate in regulatory reports, but these observations repeated Bostmr in the results of the implementation of the budget. Which clearly reflects the absence of the ro
... Show MoreTerrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro
... Show MoreThankfully Thank meets the grace and pushes us Blaneh and a curse, peace and blessings be upon the Prophet after him, and his family and companions, and after:
This research deals with the subject of the provisions of the autistic in criminal penalties, one of the important issues, especially after the spread in abundance in our contemporary society, as the patient is characterized by autism in most of spaces of isolation and depression and aggressive behavior, and in some cases try autistic to commit suicide as a result of going through the psychological pressure , was this research to clarify what follows autistic criminal penalties as a result of the capital crime of self or without them, and the stat
... Show Morethe researchers pointed that the poet relied on several means in the form of poetic images, including analogy, and the metaphor with its various elements, The chromatic component has also been used in the formation of its poetic image,and resorted to the correspondence of the senses and the symbol of two types:Self-code, public code : And we find a variety of symbolic stems from different sources, from these symbols, what is religious, including what is historical and what is legendary, and such symbols, which resorted to the rare places of his poems confined to the myths contained in the Bible, His use of the general symbols was ineffective in the poetic picture, relying on the metaphor and metaphor.
.