Sewage pumping stations are considered an important part of any sewerage system. Pumps failure in these stations means that the pumps are unable to work at the design requirement (flow capacity and head) and that may cause sewer overflow and flooding leading to sewer deterioration. In this paper, two main sewage pumping stations in Baghdad city were selected as case studies, Al- Habibia and Al-Ghazali located on Zublin trunk sewer 3000 mm and Baghdad trunk sewer 1200-2100 respectively. This study focused mainly on the operation of main sewage pumping stations and their effect, both directly and indirectly, on changing hydraulic properties, which leads to an increase in the deterioration of sewage pipes. The hydraulic analysis was conducted to investigate the effect of the operational performance of these stations on the deterioration of the trunk sewers. In general, the sewage pumps are in good condition based on the completed evaluation of these stations but, it was observed that Al-Habibia sewage pumping station was unable to discharge high sewage flow (d/D = 0.75). Backup flow occurred in the inlet sewer and caused overflow and flooding. The hydraulic analysis for the effluent sewer showed that the actual flowing velocities of the operating conditions examined were greater than the minimum self- cleaning velocity. Al-Ghazali sewage pumping station was able to receive the influent sewage for all the cases of flow (low, medium and high). While the effluent sewer (Baghdad trunk sewer) that was 70% filled with sediments, that reduced its capacity, does not work with the high discharges of the pumps. Therefore, resulting in sewage flows from this overloaded sewer onto the streets and harms the environment.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
New data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
Cosmetic products contain variable amounts of nutrients that support microbial growth. Most contaminants in cosmetic products include bacteria such as Staphylococcus, Pseudomonas, Klebsiella, Achromobacter and Alcaligenes. Contaminated water is a likely source of organisms found in cosmetic products. Products such as shampoo, hand and body lotion, facial cleanser, and liquid soaps were analyzed. In this study, out of 60 cosmetic products analyzed, 26.4% were found to be contaminated. Most of the contamination was from bacteria and no fungal contamination was detected. The highest level o
... Show More