Five sites were chosen to the north of Babil Governorate in order to identify the limnological features and the impact of the Hindiya Dam during 2019. Site2 was located near the dam to reflect the ecological features of this site, whereas other sites, S1 was located at the upstream of the dam as a control site. Moreover, the two other sites S3 and S4 were located down the dam. The results of the study showed a close correlation between air and water temperature at all sites. Also there were significant differences in average of thirteen out of eighteen water parameters.Water temperature, total alkalinity, bicarbonate, DO, POS, TH and Mg+2 ions decreased from 22.76˚C, 203.33 mg/L, 146.75 mg/L, 8.8 mg/L, 100.023%, 438 mg/L, 35.55mg/L, respectively on S2 to 22.66 ˚C, 200.28 mg/L, 145.58 mg/L, 8.35 mg/L, 95.45%, 422.66 mg/L, 28.81 mg/L, respectively at site below the dam. While, turbidity, TSS, Ca+2, SO2+4, NO3-2 and PO4-2 increased from 13.32 NTU, 23.08 mg/L, 116.89 mg/L, 107.5 mg/L, 1.027 mg/L and 0.019 mg/L, respectively on S2 to 26.574 NTU, 26.83 mg/L, 119.23 mg/L, 137.5 mg/L, 1.145 mg/L and 0.032 mg/L, respectively at the site below the dam. However, no apparent dam effect was reported in EC, S, TDS, pH values at Euphrates River. No significant differences of all characteristics were found among sites except, turbidity, TSS, Mg+2, SO+4 and PO4-2. It can be considered that the Euphrates River is very hard, oligohaline, slightly alkaline, well ventilated and clear to turbid. In addition, the turbidity and TSS values exceeded permissible limits of water quality for aquatic life in most samples especially in site below the dam. However, the river was considered by BOD5 to be doubtful in its cleanliness water. Calcium, magnesium, nitrate and phosphate values in this study were within permissible limits.
Bridging the Gap between Graphemes and Phonemes in the Phonetic Transcription
This research aims to analyze the impact of the United States policy of pressure and sanctions on changing Iran's conduct. Since the Islamic Revolution of Iran in 1979, the US has continuously pursued various policies towards Iran, aiming to change the regime by force or isolate it politically and economically. The main research question lies in the following: To what extent does the US pressure policy and its sanctions affect the conduct Iran?. This research discusses that the more there are economic and political alternatives to Iran, the more it will be challenging the US demands. Moreover, the more the US pursues a negotiating policy based on mutual interests, the more Iran will positively respond to American demands.
This study investigates the factors that led to the outbreak of protest movements in Sudan, since Sudan’s independence in 1956 until December 2018. The study aims to identify the role of protests in bringing about political and social transformations in Sudan, besides identifying the factors that help in the success or failure of the governments that resulted from those protests, with special emphasis on the challenges of the government of the 2018 revolution. The main results of the study reveal that the December 2018 protests are the largest in term of numbers, and witness huge participation of youth and women, and the slogans raised were national and comprehensive. However, the challenges that the transitional government is going th
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreBackground: COVID-19 is an ongoing disease that caused, and still causes, many challenges for humanity. In fact, COVID-19 death cases reached more than 4.5 million by the end of August 2021, although an improvement in the medical treatments and pharmaceutical protocols was obtained, and many vaccines were released. Objective: To, statistically, analyze the data of COVID-19 patients at Alshifaa Healthcare Center (Baghdad, Iraq). Methods: In this work, a statistical analysis was conducted on data included the total number, positive cases, and negative cases of people tested for COVID-19 at the Alshifaa Healthcare Center/Baghdad for the period 1 September – 31 December 2020. The number of people who got the test was 1080, where 424 w
... Show MoreIn this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv an
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)