This study assessed the quality of hand-dug drinking water sources in Eku and its environs at Eku I, Samagidi, Eku 2, and Okuechi, using the weighted arithmetic water quality index method. Water samples collected from hand-dug wells at these locations returned values for analyzed parameters. Temperature 26 – 30(⁰C), dissolved Oxygen (D.O) 5.2-8mg/l, biological oxygen demand (BOD) 5.2-8(mg/l), Electrical Conductivity (EC) 77-119(µS/cm), Total suspended solids were (TSS) 20000-120000(mg/l), pH 5.31-7.09, Phosphates 2-9.2(mg/l), Alkalinity 28-160(mg/l), Turbidity, 0.02 -0.19(NTU) Total coliform 2 -48 (cfu/ml) and fungal count 1-502. Variations in the values of these parameters were only significant for phosphate, alkalinity, and turb
... Show MoreThe purpose of this paper is to shed light on the concept of fuzzy logic ,its application in linguistics ,especially in language teaching and the fuzziness of some lexical items in English.
Fuzziness means that the semantic boundaries of some lexical items are indefinite and ideterminate.Fuzzy logic provides a very precise approach for dealing with this indeterminacy and uncertainty which grows (among other reasons) out of human behavior and the effect of society.
The concept of fuzzy logic has emerged in the development of the theory of fuzzy set by Lotfi Zadeh(a professor of computer science at the university of California) in 1965.It can be thought of as the application side of the fuzzy set theory. In linguistics, few scholars
Praise be to God alone, and after:
This is a research entitled: “A fundamental study of judicial jurisprudence rules and their applications in the Hanbali school of thought,” in which the researcher studied eight legal jurisprudential rules considered by the Hanbalis and others.
At the conclusion of his research, the researcher reached a number of results, including: the importance of taking care of judicial rules, and the need for judges and their assistants to them, including: the need for students of science in Hanbali jurisprudence to study these rules according to the doctrine, and to highlight their applications to them, including: the importance of the rules under study, and their impact on rulings Jurisprudenc
... Show MoreThe studies on unbonded post-tensioned concrete members strengthened with Carbon Fiber Reinforced Polymers (CFRPs) are limited and the effect of strengthening on the strain of unbonded pre-stressed steel is not well characterized. Estimating the flexural capacity of unbound post-tensioned members using the design methodology specified in the design guidelines for FRP strengthening techniques of bonded post-tensioned members does not provide a reliable evaluation. This study investigates the behavior of unbonded post-tensioned concrete members with partial strand damage (14.3% and 28.6% damage) and strengthened with CFRP laminates using a near-surface mounted technique with and without U-wrap anchorages. The experimental results show
... Show MoreThat internal control is particularly important in improvingperformance and tax reform، they play an important role in the regularity ofwork and development and the anti corruption and activating the decisionsand tax legislation، as contained in the organizational plan and the means،procedures and components designed from which to ensure a policy andimplementation plans The research aims to review the reality of the internalcontrol in the General Commission for Taxes and stand on the deficiencies init, with the strengthening of the role of internal control in the GeneralAuthority for taxes based on the laws and regulations and by using modernmeans to work as well as developing the performance of employees in thebody، including helpin
... Show MoreThis research concerns the fact of the school garden and how can we tackle this issue. The research starts with a question forwarded to those who are interested in the ministry of education matters; the question is that how is the extent of interest in the school garden project? And how it is activated in the Iraqi Educational Institution program? In addition, the analysis reveals the importance of the school garden since we, as teachers and students, suffer from seeing the view of the trashes, the wastes of school furniture, the stinking water and the weeds and how it is accumulated in the back yard of the school. To add fuel to the fire, the increase in number of the students; year after year. This increase leads to adding more classes
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt& pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.