The present study is considered the first on this sector of the Tigris River after 2003. It is designed for two aims, the first is to demonstrate the seasonal variations in physicochemical parameters of Tharthar-Tigris Canal and Tigris River; the second is to explain the possible effects of canal on some environmental properties in the Tigris River. Water samples were being collected monthly. Six sampling sites were selected, two on Tharthar Canal and four along the Tigris River, one before the confluence as a control site and the others downstream the confluence with the canal. For a period from January to December 2020, nineteen physicochemical parameters were investigated including air and water temperature, turbidity, electrical conductivity, salinity dissolved oxygen, percent oxygen saturation, biological oxygen demand, pH, total hardness, calcium, magnesium, sulphate, total dissolved solids, total suspended solids, total alkalinity, bicarbonate, nitrate and phosphate. The results showed that air and water temperatures were close in both Tigris and canal. The waters were well aerated, slightly alkaline and over saturation was recorded several times, while biological oxygen demand values did not exceed 5 mg/L along study period. The high values of conductivity, salinity, total dissolved solids, total hardness, calcium and sulphate ions in Tharthar water increased in the Tigris River below the confluence. Whereas, the low values of turbidity, TSS, total alkalinity and bicarbonate in the arm diluted in the main river. It has been concluded that Tharthar Canal affected the Tigris River by either increasing or diluting of the Tigris chemical components.
This current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreIn this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation
The study aims to determine the responsibility of nursing staff for medical errors that accompany the surgery at the hospital , which is one of the important issues that the importance of determining the responsibility of landlords nursing medical errors in the hospital was the rationale in choosing the subject. Since study included cases of errors nursing staff of (22) case. While the checklist distributed to a sample of nursing Angel Group in Sadr Teaching Hospital 's (100) nurs According to the problem, the study in determining the responsibility of nursing staff for medical errors that are not important for the hospitals. Has shown results of the study agreement members of the study sample that the clarity of the power posses
... Show MoreAt a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show MoreThis research was conducted in order to monitor and measure the dimensions of media policy in satellite channels directed from the point of view of the communicator, and this research is classified among the descriptive studies, as the researcher used the survey method to answer the questions that were formulated in light of the research problem represented by the main question: What are the dimensions of media policy in Directed satellite channels? .
To achieve the objectives of the study, the researcher used the following tools:
The questionnaire, in order to survey the attitudes of communicators about the extent to which the media policy during crises reflects on their professional standards. The research community is represente
What distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)