Abstract To ensure that the distribution system has safe drinking water. It is necessary to know the residual chlorine concentrations at various points in the network. A chlorine photometer device was used to measure twenty points taken every day for a week at a selected time in the distribution system. Both pressures and flows in the network were measured using bourdon gauge and Tuf-2000H Handheld Digital ultrasonic flow meters. WaterGEMS CONNECT Edition update one software was used to simulate the flow in the network. The Baghdad water department provided the data about the network, such as the lengths of pipes, the layout of the network, and pipes diameters. The network calibrated consists of 781 pipes of different lengths and 542 juncti
... Show MoreThe water quality index is the most common mathematical way of monitoring water characteristics due to the reasons for the water parameters to identify the type of water and the validity of its use, whether for drinking, agricultural, or industrial purposes. The water arithmetic indicator method was used to evaluate the drinking water of the Al-Muthana project, where the design capacity was (40000) m3/day, and it consists of traditional units used to treat raw water. Based on the water parameters (Turb, TDS, TH, SO4, NO2, NO3, Cl, Mg, and Ca), the evaluation results were that the quality of drinking water is within the second category of the requirements of the WHO (86.658%) and the first category of the standard has not been met du
... Show MoreThe water quality index is the most common mathematical way of monitoring water characteristics due to the reasons for the water parameters to identify the type of water and the validity of its use, whether for drinking, agricultural, or industrial purposes. The water arithmetic indicator method was used to evaluate the drinking water of the Al-Muthana project, where the design capacity was (40000) m3/day, and it consists of traditional units used to treat raw water. Based on the water parameters (Turb, TDS, TH, SO4, NO2, NO3, Cl, Mg, and Ca), the evaluation results were that the quality of drinking water is within the second category of the requirements of the WHO (86.658%) and the first category of the standard has not
... Show MoreAbstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the
The study was planned to evaluate the effect of adding Guanidinoacetic acid in some characteristics of the sperm of the rams. This study was conducted in the animal field of the Animal Production Department / Faculty of Agricultural Engineering Sciences / University of Baghdad, for the period from 5/8/2018 to 28/2/2019. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-54 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: GAA-free control group, treatment T1 (0.05 mg / 100 ml GAA), T2 treatment (0.1 mg / 100 ml GAA) and T3 treatment (0.2 mg / 100 ml GAA). The results of the study showed a significant decrease
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show More