This study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreThis research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show MoreWith the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreReconstruction of female identity is one of the important issues in modern times. The majority of the females who descent from the countries of the third world confront lots of problems because of their race and gender. Black females or colored skin females because of the oppression of the white society upon them, try hard to cope with society in order to get some relief and feel that they are part of this cruel white society. One of the solutions for these black females is to reconstruct their identity by mimicry to the English beauty standards. Zadie Smith is a postcolonial author. She deals with third- world women and how they are treated in a minority and in a racist way. She strives to empower the subaltern black females who ha
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreAn experimental and numerical study has been carried out to investigate the forced convection heat transfer by clean or dusty air in a two dimensional annulus enclosure filled with porous media (glass beads) between two vertical concentric cylinders. The outer cylinder is of (82 mm) outside diameters and the inner cylinder of (27 mm) outside diameter. Under steady state condition; the inner cylinder surface is maintained at a high temperature by applying a uniform heat flux and the outer cylinder surface at an ambient temperature. The investigation covered values of input power of (6.3, 4.884, 4.04 and 3.26 W), Reynolds number values of (300, 700, 1000, 1500, and 2000) and dust ratio values (density number N) of (2, 4, 6 and 8). A comput
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe creative production of the philosophy of beauty in artistic works constitutes a step towards development and progress by meeting the growing and changing needs of humanity according to various factors, including those related to the human situation and others related to technical outputs, as well as the multiplicity of the field for the emergence of new artistic currents and movements concerned with graphic production and communication and communication processes that It is associated with imagination and freedom from social and cultural constraints, in which the design production seeks to link more realistic intellectual contents with the achievements of the creative artwork as a communication system to involve the recipient (the vi
... Show More