This paper describes the use of remote sensing techniques in verification of the polluted area in Diyala River and Tigris River and the effected of AL-Rustamiyah wastewater treatment plant, which is located on Diyala River, one of the branches of Tigris River in south of Baghdad. SPOT-5 a French satellite image of Baghdad, Iraq was used with ground resolution of 2.5 m in May 2016. ENVI 5.1 software programming was utilized for Image processing to assess the water pollution of Diyala and Tigris River’s water. Five regions were selected from a study area and then classified using the unsupervised ISODATA method. The results indicated that four classes of water quality which are successful in assessing and mapping water pollution which confirmed that the Tigris River water is subjected to pollution from Diyala River which agree with the ecological tested of water samples collected from five regions in the study area. Were The value of turbidity, Total Organic carbon, Salinization, conductivity and a measure of acidity or alkalinity (pH) in Tigris River is Ranging (60.8 - 242.6 FTU ) , (19.234 - 25.95 mg/L), (0.6487 – 0.7315 g/L),(1047-1159 µm/m) and (8.06-8.16) respectively
With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify
In this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) image
... Show MoreBackground: Suppression of quorum sensing (QS) that regulates many virulence factors, including antimicrobial resistance, in bacteria may subject the pathogenic microbes to the harmful consequences of the antibiotics, increasing their susceptibility to such drugs. Aim: The current study aimed to make an aqueous crude extract from the soil Proteus mirabilis isolate with the use of the gas chromatography-mass spectrometry (GC-MS) technique for its analysis, and then, study the impact of the extract on clinical isolates of Pseudomonas aeruginosa. Methods: Preparation of crude extracts from P. mirabilis (both organic and aqueous), which were then analyzed by GC-MS to detect the bioactive ingredients. Furthermore, the extract’s capability to i
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreThe financial fraud considers part of large concept to management and financial corruption, the financial fraud is appeared especially after corporate, that is Emerge agency theory, that is because recognize relationship between the management company and stakeholder, that is through group from constriction in order to block the management to fraud practice, that on the basis was choose another party in order fraud this practice and give opinion on financial statement, that consider basis decision making from stakeholder to basis the report auditor about creditability this is statement that reflect real activity for the company.The Auditor in order to lead work him Full professionalism to must using group from control Techniques, that is
... Show MoreEmployee Stealing or internal theft is considered from the passive practices that can’t be denied or be hidden, In spite of the hospital privacy as a serving organization that works 24\7 and deleing with human lives, they weren’t infallible from that kind of practice. To prevent or reduce this practice, it was important to search for the organizational and behavioral factors influencing internal thefts. The study problem briefly is to reach the most organizational and behavioral factors influencing internal theft, in governmental hospitals in Baghdad Rusafa Health district, this was done by analyzing (20) administrative cases of thefts occurred in the District, also a sample of (60) specialist Doctor’s opinion work, in (3) hospital
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet
... Show MoreCompression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.