The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calibrated model were very close tothe actual concentrations measured in field at different sampling points for different sampling days.Keywords: Chlorine decay, Water quality, Water distribution network, EPANET softwar (PDF) Simulation of Chlorine Decay in Al-Gukook Water Distribution Networks Using EPANET. Available from: https://www.researchgate.net/publication/328201790_Simulation_of_Chlorine_Decay_in_Al-Gukook_Water_Distribution_Networks_Using_EPANET [accessed Apr 07 2023].
Mercury, arsenic, cadmium and lead, were measured in sediment samples of river and marine environmental of Basra governorate in southern of Iraq. Sixteen sites of sediment were selected and distributed along Shatt Al-Arab River and the Iraqi marine environment. The samples were distributed among one station on Euphrates River before its confluence with Tigris River and Shatt Al-Arab formation, seven stations along Shatt Al-Arab River and eight stations were selected from the Iraqi marine region. All samples were collected from surface sediment in low tide time. ICP technique was used for the determination of mercury and arsenic for all samples, while cadmium and lead were measured for the same samples by using Atomic Absorption Spectrosc
... Show More<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show MoreThe research problem stems from a chief question: “What is the nature of the responsibility that «Al-Sabah Al-Jadeed» and «Al-Mada» Newspapers have undertaken in promoting the values of citizenship and national belonging in the society? The research aims to achieve a number of goals, including: Determining the most prominent themes that were emphasized in the opinion articles in these two newspapers within the framework of the responsibility of promoting the values of citizenship and national belonging in society, and revealing the most prominent topics that were discussed in opinion articles in the two sample newspapers regarding the promotion of the mentioned values. This research is a desc
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More