Source, sedimentation, coagulation, flocculation, filter, and tank are parts of a water treatment plant. As a result, some issues threaten the process and affect the drinking water quality, which is required to provide clean drinking water according to special standards and international and local specifications, determined by laboratory results from physical, chemical, and biological tests. In order to keep the water safe for drinking, it is necessary to analyze the risks and assess the pollution that occurs in every part of the plant. The method is carried out in a common way, which is monitoring through laboratory tests, and it is among the standards of the global and local health regulators
Source, sedimentation, coagulation, flocculation, filter, and tank are parts of a water treatment plant. As a result, some issues threaten the process and affect the drinking water quality, which is required to provide clean drinking water according to special standards and international and local specifications, determined by laboratory results from physical, chemical, and biological tests. In order to keep the water safe for drinking, it is necessary to analyze the risks and assess the pollution that occurs in every part of the plant. The method is carried out in a common way, which is monitoring through laboratory tests, and it is among the standards of the global and local health regulators
Complex-valued regular functions that are normalized in the open unit disk are vastly studied. The current study introduces a new fractional integrodifferential (non-linear) operator. Based on the pre-Schwarzian derivative, certain appropriate stipulations on the parameters included in this con-structed operator to be univalent and bounded are investigated and determined.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Communities seek to achieve the economic growth through the optimal use of resources. The human resource is considered the most important of those resources where the insurance institutions take the larger role in the protection of this resource and reducing the impact caused by dangers realization that endures. The general Iraqi insurance company is considered the leading in the field of life insurance since it was founded, and until now.
This research is based on an analyzing the relation between premiums and compensations of life insurance, for individual and the group insurance, and a reality of the
... Show MoreThe idea of carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed
... Show MoreOur study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac
... Show MoreAbstract
The Purpose of This Research is The Main Factors In out Comes Phenomena From Primary School Which in Creased in Lost Period in Iraq And to Find Solutions to The This Problem.
In Order to Achieve Al The Aim The Research Choose a Systematic Random Sample of School Records For Students in Some Primary Schools in Karkh and Rusafa and Year of Study (2010-2015) and Size (40) Samples, included (16) Variable , Collected in Form Prepared by The Research As a Way to Analyze The Data.
Remember to Summarize The (6) Main components Pay a Student to Drop out of Primary Schools in The Province of Baghdad are Arranged As Follows:
... Show MoreImportant points were concluded from this analysis related with the presence of the same variable CEs within multiple isolates with different time points being under the selection and the location of SNPs within the conserved functional pattern of CEs. In the 40 isolates, 9 out of 39 variable CEs conducted with multiple isolates