The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreTannin acyl hydrolase as the common name of tannase is an inducible extracellular enzyme that causes the hydrolysis of galloyl ester and depside bonds in tannins, yielding gallic acid and glucose. The main objective of this study is to find a novel gallic acid and tannase produced by
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe researchers go to the classification of the book (mortality of objects) of Ibn Khalkan in the books of biographies, translations and history and consider it an important dictionary in translations and this is not disputed, but none of them did not reveal clearly about the literary phenomenon in which it is clearly related and the size of this phenomenon, it has come in the side This research sought to investigate this critical encyclopedia, which occupied a large area of the historical framework of the book as we rarely found a figure in which did not turn - in extrapolation of translations - in the orbit of poetry as well as the great celebration of poetic speech during Translation has reached a number Perhaps the most promine
... Show MoreThe main challenge of military tactical communication systems is the accessibility of relevant information on the particular operating environment required for the determination of the waveform's ideal use. The existing propagation model focuses mainly on broadcasting and commercial wireless communication with a highs transceiver antenna that is not suitable for numerous military tactical communication systems. This paper presents a study of the path loss model related to radio propagation profile within the suburban in Kuala Lumpur. The experimental path loss modeling for VHF propagation was collected from various suburban settings for the 30-88 MHz frequency range. This experiment was highly affected by ecological factors and existing
... Show MorePhoto citation request in examples Of ascetic poetry in the first Abbasid era
סיכום
המשבר הוא מצב מצוי רב בחברת המדינות אחרי המלחמות והשינויים הגדולים במאה העשרים, ומשבר הזהות הוא ממשברי המאה העשרים שזכה בהתעניינות רבה בכל תחומי המדעים האנושיים, ומהם תחום הספרות. ובספרות העברית היה הסופר א. ב. יהושע מהסופרים החשובים שהתעניין בנושא הזהות בישות הציונית, הוא התווכח בנושא ביצירותיו, ראיוניו ורוב הכנסים התרבותיים והפוליטיים שנכח אותם, הוא השתמש באסכולה ספרותית מאו
... Show More