The quality of groundwater should be improved by keeping safe water sources from contaminants in protective way by doing regular measuring and checkup before it supplied for usage. Private Wells do not receive the same services that wells supplying the public do. Well owners are responsible for protecting their drinking water. This work was carried out in Badra city, Iraq from December 2017 to May 2018, six wells water were investigated to determine the general characteristics of wells as well as studying the effect of environmental factors on the quality of water. The average of six wells were eleven parameters that is out of permissible limits were EC, Sal., Alk., TH, TDS, Na, Ca, Cl, SO4, Fe, Zn (4402-5183 /cm, 2.76-3.9 ppt, 302-366mg/L, 3164-4248 mg/L, 604-675 mg/L, 375-524 mg/L, 635-871 mg/L, 631-1107 mg/L, 2430-4570 g/L, 114-392 g/L). Respectively, microbiological investigations involved the total coliform, total plate count, as well as the detection for the presence of E. coli, Salmonella and Cholera. Results shows that there is a significant relation between the increasing of the TDS and Turbidity, TDS gives an indication for the significant increasing of chemical ions. Wells number 3, 4 and 5 showed gave positive results for E.coli growth which as a source of microbial pollution. Detection for the presence of chemical and microbial contaminate is an important alarm since this water has a direct effect on the human and animal's health. Advance method of rapid detection for the well water quality is highly recommended to avoid any health issue and prevent the outbreak of health risk and ecological contaminants.
To accommodate utilities in buildings, different sizes of openings are provided in the web of reinforced concrete deep beams, which cause reductions in the beam strength and stiffness. This paper aims to investigate experimentally and numerically the effectiveness of using carbon fiber reinforced polymer (CFRP) strips, as a strengthening technique, to externally strengthen reinforced concrete continuous deep beams (RCCDBs) with large openings. The experimental work included testing three RCCDBs under five-point bending. A reference specimen was prepared without openings to explore the reductions in strength and stiffness after providing large openings. Openings were created symmetrically at the center of spans of the other specimens
... Show MoreNon-prismatic reinforced concrete (RC) beams are widely used for various practical purposes, including enhancing architectural aesthetics and increasing the overall thickness in the support area above the column, which gives high assurance to services that this will not result in the distortion of construction features and can reduce heights. The hollow sections (recess) can also be used for the maintenance of large structural sections and the safe passage of utility lines of water, gas, telecommunications, electricity, etc. They are generally used in large and complex civil engineering works like bridges. This study conducted a numerical study using the commercial finite element software ANSYS version 15 for analysing RC beams, hol
... Show MoreObjectives The strategies of tissue-engineering led to the development of living cell-based therapies to repair lost or damaged tissues, including periodontal ligament and to construct biohybrid implant. This work aimed to isolate human periodontal ligament stem cells (hPDLSCs) and implant them on fabricated polycaprolactone (PCL) for the regeneration of natural periodontal ligament (PDL) tissues. Methods hPDLSCs were harvested from extracted human premolars, cultured, and expanded to obtain PDL cells. A PDL-specific marker (periostin) was detected using an immunofluorescent assay. Electrospinning was applied to fabricate PCL at three concentrations (13%, 16%, and 20% weight/volume) in two forms, which were examined through field emission
... Show MoreFinite Element Approach is employed in this research work to solve the governing differential equations related to seepage via its foundation's dam structure. The primary focus for this reason is the discretization of domain into finite elements through the placement of imaginary nodal points and the discretization of governing equations into an equation system; An equation for each nodal point or part, and unknown variables are solved. The SEEP / W software (program) is a sub-program of the Geo-Studio software, which is used by porous soil media to compensate for the problems of seepage. To achieve the research goals, a study was carried out on Hemrin dam, which located in the Diyala River 100 km northeast of Baghdad, Iraq. Thus, o
... Show MorePoetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction
The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More