The objective of this study is to determine the concentration of copper and lead (mg/L) in drinking water by using absorption spectrophotometic and Atomic Absorption spectrophotometric method from different area in Baghdad and with different intervals , The results show that the concentration of copper and Lead ( mgL) in tap water which remains motionless in plumbing system for following periods one hours, 3 hours, 6 hours, 12 hours, 24 hours, 7 days and 14 days are (1 , 2.2 , 4 , 5.3 , 7.5 , 10 and 16 mgL copper ) & ( 0.3, 0.5 , 0.8 , 1 , 2.5 , 3 , 3.8 mg /L lead ) respectively .from these results its clear that high levels of copper & Lead occur if tap water comes in contact with copper - lead plumbing and copper lead -containing fixtures in the water distribution system. If tap water remains motionless in the plumbing system for some time. These amounts of copper and Lead are believed to give rise to the symptoms of chemical food poisoning precipitated by the ingestion of alcohol on an empty stomach ( in presence of copper ). Also children under one year of age are more sensitive to copper than adults. Long-term exposure (more than 14 days) to copper - lead in drinking water which is much higher than 1,000 ug/I has been found to cause kidney and liver damage in infants, In case of Lead it can effect a children physical development & ability to learn.
The research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi
... Show MoreAfter completion of the artistic production, the artist plays the echo of this production upon the recipient. Whether this recipient is from the public, art connoisseurs, or private artists, critics and academics. In the past, the boundaries of Time and place had a great effect in limiting this echo or its quality, as the views of the recipients were largely influenced by the prevailing thought or the artistic trends that dominate the artistic scene in the surrounding environment in which the artist created. In order for the artist to show works for the widest segment of the recipient, he bears the burden of the costs of transporting the work, a keeper of damage on the move, and the material amounts that may hinder the publication of the
... Show MoreThe OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extra road) and
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented. These species were recorded previously in the ornithological literatures by several authors and deposited in t
... Show MoreIntroduction: Cutaneous leishmaniasis (CL) is a common protozoan disease in Iraq characterized by localized ulcers, primarily on exposed skin. This study aimed to investigate the hematological parameters of infected patients using a complete blood count (CBC) in the endemic area of Diyala Governorate, northeast of Baghdad. This has been studied in newly diagnosed, untreated individuals and patients receiving sodium antimony gluconate. Methodology: Hematological screening was performed on blood samples from 161 patients with microscopically diagnosed cutaneous leishmaniasis before and after treatment. Anti-Leishmania IgG was also assessed by ELISA in seropositive and seronegative subjects. Results: The newly diagnosed, untreated pati
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show More