In the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesium (Mg), calcium (Ca), chlorine (Cl), phosphate (PO4) and nitrate (NO3) were detected and analyzed. The grid soil samples on the site and surrounding areas have been investigated, analyzed, and compared to the background points. The storage area grid was divided into 30 major sectors and all samples were evaluated from acquires 10 samples from each sector. The detection results have indicated that SO4 level was exceeded the permitted level by 25 times, K level also exceeded the permitted level but by 460, Na ions were 85 times greater the permitted level. Mg level was 180 times higher than that of permitted content. Activity level of Ca in the soil samples of the study area has also exhibited variability with nine times over the permitted level near the bunkers. However, very high contamination spot activity of Cl was found in destruction zone about which 44 times over the background level was found while PO4 level exceeded the permitted level by 35 times over the permitted level and there was no activity detected for the nitrate in the storage area site.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreObjective: To assess the nutritional status of hemodialysis patients.
Methodology: A descriptive quantitative cross sectional study was effectuated in hemodialysis centers from
February 2011 to September 2011. A purposive "non-probability" sample of (70) male and female hemodialysis
patients in al-Najaf al-Ashraf Governorate from those who have spent more than six months on maintenance
hemodialysis schedule. Data collected through using of a well-designed questionnaire consist of five parts, part
one consists of sociodemographic contain (9) items, and part two consists of medical data contain (8) items, and
part three consists of health and nutrition behavior contain (12) items plus (8) items of anthropometric
measur
The aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.
The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.
Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.
The results of the research showed an inverse relation between being unemployed and having wellbeing.
&nb
... Show MoreAl-Rustamiya sewage treatment plant (WWTP) serves the east side of Baghdad city (Rusafa) and is considered one of the largest projects.It consists of three parts (old project F0, first extension F1, and second extension F2) that treat wastewater and the
effluent is discharged into Diyala river and thus into the Tigris River. These plants are designed and constructed with an aim to manage wastewater to reachIraqi effluent standard for BOD5, COD, TSS and chloride concentrations of 40, 100, 60 and 600
mg/L respectively. The data recordedfrom March till December 2011 provided from Al-RustamiyaWWTP, were considered in this study to evaluate the performance of the plant. The results indicated that the strength of the wastewater enterin
Abstract
Praise be to Allah, The Lord of the worlds, and peace be upon
Muhammad the master of former and latter people, and peace be upon His
relatives, companions and those who followed Him to Judgment day.
After recognizing the prescription which is called (Al- Fadhaly's Thesis in
parsing of "There is no god but God") as it is related with the word of the
investigation of this issue attracted me, as being related with the idea of the
only one God that is mentioned in the prophetic speech, which is said by
Anas- God satisfies him- Who said, Said the Messenger Muhammad peace
be upon him " Goes out of the Hell who said: there is no god but God, and in
his heart a hair weight of charity, and goes out of the He
The first chapter includes introduce the research and the problem of the research that there are negligence of some educational institutions and schools management , some parents and supervisors .Also there are some educators who believes that school activities are obstacles means to learning and prevent pupils from studying and understanding the subjects. That may due to social , psychological and educational reasons
The purposes of the researches come from the reports of supervision visits which indicate a lot of difficulties faced by pupils and teachers related to education activities and its influence on in education and the necessity of indentify these difficulties and remedy them
... Show MoreThe purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the