Granular carbon can be used after conventional filtration of suspended matter or, as a combination of filtration - adsorption medium. The choice of equipment depends on the severity of the organic removal problem, the availability of existing equipment, and the desired improvement of adsorption condition.
Design calculations on dechlorination by granular - carbon filters considering the effects of flow rate, pH , contact time, head loss and bed expansion in backwashing , particle size, and physical characteristics were considered assuming the absence of bacteria or any organic interface .
This research deals with a jurisprudential manuscript with study and investigation by Sheikh Ibrahim Al-Kurani, one of the prominent Kurdish scholars in the eleventh century. Some claim that it is heresy in the religion, and that the Prophet, may God bless him and grant him peace, did not do it.
The Sheikh responded to that, confirming its permissibility, and that it does not fall within the innovated matters, based on its permissibility on the two Eids and other religious occasions, and also that the issue of supplication with acceptance was legislated for the sake of worship without specifying it to one without the other, and it is known that prayer is one of the greatest acts of worship. supplication that fasting is accepted;
... Show Moreاليورانيوم المنضب واستخدامه امريكياً في العراق
For in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a
... Show MoreThis research deals with the most famous existing definitions of public relations, in an attempt to achieve a definition that will be added to the other existing and widespread definitions, especially that big developments have taken place in the concept of public relations and their idiomatic use.
In addition, many definitions of public relations have been restricted to some limited descriptions, therefore many of the descriptions given to the public relations are basically definitions as well as characteristics of the public relations.
This research aims at setting and formulating the definitions of public relations, it also deals with its credibility in achieving its significance in order to reach a new definition that
... Show MoreIn this paper ,we introduce hollow modules with respect to an arbitrary submodule .Let M be a non-zero module and T be a submodule of M .We say that M is aT-hollow module if every proper submodule K of M such that T ⊈ K is a T-small submodule of M .We investigate the basic properties of a T-hollow module
Forty patients with acute lymphoblastic leukemia(ALL) were tested for the serum levels of total sialic acid(TSA) and the immunoglobulins before and after treatnemnt with six diffrent chemotherapy protocols while significantly
In this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
Fundamentals Concept in Metorology an Introductory Survey - ISBNiraq.org
is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreFor several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.