Water samples were collected from output of water for Al-Wahda plant where located in al-karrada area in Baghdad city to study water contamination with bacteria, fungi and Algae. The study lasted one year started on August, 2016 to July,2017.Results were acquired according to two tests performed, the first is biological test included total coliform,E.coli, pseudomonas aeruginosa, total fungi, Diatom and non Diatom Algae and the second is physiochemical test included temperature, turbidity and residual chlorine. The results of bacteria were within the permitted specification in the Iraqi standards no. 14/2270 for the year 2015 except August was exceeded the permitted standard for total coliform, it was 1.1< cell/100 ml.Total Fungi, Dia
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreExpansive soil is one of the most serious problems that face engineers during the execution of any infrastructure projects. Soil stabilization using chemical admixture is one of the most traditional and widespread methods of soil improvement. Nevertheless, soil improvement on site is one of the most economical solutions for many engineering applications. Using construction and demolishing waste in soil stabilization is still under research., The aim of this study is to identify the effect of using concrete demolishing waste (CDW) in soil stabilization. Serious tests were conducted to investigate the changes in the geotechnical properties of the natural soil stabilized with CDW. From the results, it is concluded that the
... Show MoreThis paper is concerned with the numerical solutions of the vorticity transport equation (VTE) in two-dimensional space with homogenous Dirichlet boundary conditions. Namely, for this problem, the Crank-Nicolson finite difference equation is derived. In addition, the consistency and stability of the Crank-Nicolson method are studied. Moreover, a numerical experiment is considered to study the convergence of the Crank-Nicolson scheme and to visualize the discrete graphs for the vorticity and stream functions. The analytical result shows that the proposed scheme is consistent, whereas the numerical results show that the solutions are stable with small space-steps and at any time levels.
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt