This study aims to establish an empirical correlation between biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) of the sewage flowing in Al-Diwaniyah wastewater treatment plant. The strength of the wastewater entering the plant varied from medium to high. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate rapid effluent assessment or optimal process control. The equations relating the percentage removal of BOD5(y) with influent BOD5(x), y= 0.044x + 80.66 and the percentage removal of COD (y) with influent COD (x), y= 0.045x + 55.15 were found with high correlation R2 =0.72 and 0.86 respectively.
Cardiovascular diseases CVD are responsible for the majority of death in many countries, the term cardiovascular disease CVD includes several diseases such as: coronary artery diseases (angina, myocardial infaraction MI, atherosclerosis) and stroke. These diseases cause elevation of TC, TG, LDL, VLDL, and MDA levels in plasma and decrease of HDL levels and PON activity in plasma, because of elevation in lipid peroxidation (LPO) activity. Catechins is a water extract of green tea composed of: (-)epicatchin EC, ECG, EGC, EGCG, (+) catechin C and GC, these compounds play great roles against chronic diseases such as CVD. The effect of catechins extract on the preceding biochemical parameters was investigated in 40 volunteer male
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreAbstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed
... Show MoreIn this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented. The numerical solution of these equations is obtained by using Open Newton Cotes formula. The Open Newton Cotes formula is applied to find the optimum solution for this equation. The computer program is written in (MATLAB) language (version 6)
Minister Yacoub Ben Keles distinguished himself with leadership and administrative talents, as well as his abilities in the field of jurisprudence, which made him the top political, administrative and cultural scene of the Fatimid state and left its mark on it by influencing its fateful decisions.
He was the son of Kels of the Jews of Baghdad, where he learned writing and arithmetic, and moved with his father to Syria and then carried him to Egypt.
Egypt embraced the son of Kels, living in a transitional period from the Achaishid era to the Fatimid period. Both these two covenants reconciled this man to his career until he became minister in the Fatimids in 368 A.H. / 978 A.D.
His character was overshadowed by most of the state'
This study investigates the implementation of Taguchi design in the estimation of minimum corrosion rate of mild-steel in cooling tower that uses saline solution of different concentration. The experiments were set on the basis of Taguchi’s L16 orthogonal array. The runs were carried out under different condition such as inlet concentration of saline solution, temperature, and flowrate. The Signal-to- Noise ratio and ANOVA analysis were used to define the impact of cooling tower working conditions on the corrosion rate. A regression had been modelled and optimized to identify the optimum level for the working parameters that had been founded to be 13%NaCl, 35ᴼC, and 1 l/min. Also a confirmation run to establish the p
... Show More