Monitoring the river’s water quality is important to predict the environmental risk. The Tigris River is Baghdad’s main source for living organisms, drinking water, and agro-industrial purposes. Three selected sites were carried out using different water quality parameters from July 2017 to April 2018 in the Tigris River in Baghdad. Fourteen water quality parameters: water temperatures, turbidity, electrical conductivity, pH, calcium, magnesium, chloride, sulfate, phosphate, dissolved oxygen (DO), alkalinity, total hardness, total dissolved substances TDS, and biological oxygen demand (BOD5). According to CCME WQI analysis, the water quality of Tigris River water was Fair for aqua
The study aimed to measure the phsycological tolerance and self-efficacy among the students of Baghdad university and knon the significant differences in psychological tolerance and self-efficacy according to the variables (Gender-Specialization)and the interaction between themas well as the study aimed to identify the strength and direction of the relationship between psychological tolerance and self-efficacy of the study sampleincluded asample of the current study(370) students from grades four ,the researcher used the measure of psychological tolerance and self-efficacy prepared by the researcher ,and the results showed that college students Generally have adegree of psychological tolerance and that there are statistically sig
... Show MoreThe present study was conducted to estimate the incidence, clinical findings, cytological and histopathological characteristics of spontaneously occurring skin neoplasms in dogs. A total of 40 grossly suspected cases of cutaneous and subcutaneous tumors were gathered during the period from July 2016 to August 2018 from male and female dogs in Baghdad city. Dogs with skin neoplasia revealed various clinical signs, and their ages were older than 5 years to 15 years. German shepherd 30% followed by Terrier dogs 25% were more influenced than other breeds. Concerning tumor features, the majority of neoplasms had solitary lesion 70%, regular shapes 65% with black color 55%. The tumors frequently occurred on fore-limbs and abdomen, and 80% of them
... Show MoreThis study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show Moremajor goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreIn modern hydraulic control systems, the trend in hydraulic power applications is to improve efficiency and performance. “Proportional valve” is generally applied to pressure, flow and directional-control valves which continuously convert a variable input signal into a smooth and proportional hydraulic output signal. It creates a variable resistance (orifice) upstream and downstream of a hydraulic actuator, and is meter in/meter out circuit and hence pressure drop, and power losses are inevitable. If velocity (position) feedback is used, flow pattern control is possible. Without aforementioned flow pattern, control is very “loose” and relies on “visual” feed back by the operator. At this point, we should examine how this valv
... Show MoreThe utilization of sugarcane molasses (SCM), a byproduct of sugar refining, offers a promising bio-based alternative to conventional chemical admixtures in cementitious systems. This study investigates the effects of SCM at five dosage levels, 0.25%, 0.50%, 0.75%, 1.00%, and 1.25% by weight of cement, on cement mortar performance across fresh, mechanical, thermal, durability, and density criteria. A comprehensive experimental methodology was employed, including flow table testing, compressive strength (7, 14, and 28 days) and flexural strength measurements, embedded thermal sensors for real-time hydration monitoring, water absorption and chloride ion penetration tests, as well as 28-day density determination. Results revealed clear
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThis work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian