In this study water quality index (WQI) was calculated to classify the flowing water in the Tigris River in Baghdad city. GIS was used to develop colored water quality maps indicating the classification of the river for drinking water purposes. Water quality parameters including: Turbidity, pH, Alkalinity, Total hardness, Calcium, Magnesium, Iron, Chloride, Sulfate, Nitrite, Nitrate, Ammonia, Orthophosphate and Total dissolved solids were used for WQI determination. These parameters were recorded at the intakes of the WTPs in Baghdad for the period 2004 to 2011. The results from the annual average WQI analysis classified the Tigris River very poor to polluted at the north of Baghdad (Alkarkh WTP) while it was very poor to very polluted in t
... Show MoreThis study aims to know how and what is the media processing presented by the television talk shows for the religious extremism topics in terms of topics, hosted personalities, and ways to address this global phenomenon.
The study is based on descriptive research, and the researcher used the analytical-survey method, analyzing the episodes of (Awkar Al Dhalam) T.V Show which was presented on Al-Iraqiya News Channel, and (Islam Hur) T.V Show which was presented on Al-Hurra in 2019 with 25 episodes from each Show, The sample and research community was chosen with the intent to cover the research problem and its
The study reached several conclusions, including:
- The various dialogs in the episo
This article discusses how women have significant abilities to cope with the difficulties of war times. They are not the weak and vulnerable victims who are thought to be. On the contrary, they have the power to control over many-sided fronts, like participating in the battlefield as nurses or activists for peace, or even fighters, as well as through the tasks and responsibilities assigned to them to protect and support their families during wartime. The researcher will examine the impact of war upon women. Like men, women suffer during wartime. They are being injured, tortured and killed. Yet, they are able to give examples of love and courage even in the difficult times of war. Hana is one of those women who lived during wartimes,
... Show MoreThe attention of civil society organizations, governments and international non-governmental organizations in recent years has focused on the acute practices adopted by companies with the aim of reducing the tax burden, and the results of these practices have a negative impact on the tax revenues that the state uses to finance public needsThe aim of the research is to measure the impact of the voluntary disclosure of companies on tax planning for the period from 2011 to 2015 and the research community is in the General Tax Authority. The research sample is 6 companies within the private sector in the financial, banking, insurance and industrial fields. The research was based on a special model to measure the optional disclosure,
... Show MoreKinetics study on the phenol oxidation by catalytic wet air oxidation (CWAO) using CuO.NiO/Al2O3 as heterogeneous catalyst is presented. 4 g/l phenol solution of pH 7.3 was oxidized in a trickle bed reactor with gas flow rate of 80% stochiometric excess (S.E).. In order to verify the proposed kinetics, a series of CWAO experimental tests were done at two temperatures (140 and 160° C), oxygen partial pressures (9 and 12 bar), and weight hourly space velocity (WHSV) (1, 1.5, 2, 2.5, and 3 h-1). According to Power Law, the reaction orders are found to be approximately 1 and 0.5 with respect to phenol concentration and oxygen solubility, respectively. These values favorably compare with those cited in the literature for intrinsic kinetics,
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreAn experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show More