The researchers have tried to focus on how to determine the number of pipes that are present in one obtained hyperbola in radargram profile. Ground Penetration Radar (GPR) survey was performed to distinguish between two zero-spaced iron pipes in radargram. The field work was carried out by constructing artificial rectangular models with dimensions of length, width, and depth equal to 10.0, 1.0, 0.65 meter respectively that filled with dry clastic mixture deposit, three twin sets of air filled iron pipes of 15.24 cm (6 inch) diameter were buried horizontally and vertically inside the mixture at different distances together. Visual and Numerical interpretation were chosen to get the best results. In the visual interpretation, the amplitude variations show that the height of the positive peaks increases with the increase of the space distance between the buried pipes. Numerical interpretation appeared that the decrease in the width of the bands means an increase of the space between the pipes. The second part of the numerical analysis comprises measuring the amplitude value variation, among the signal forms; relying on the value of amplitude in each hyperbola the distinction process becomes quite easy. Depending on the variations in amplitude, the identification and discrimination of two closely spaced underground pipes will be feasible. The big values refer to highly spaced pipes while the low values denote the slightly spaced pipes. It is worth mentioning that the lowest value indicates the amplitude of only one buried iron pipe.
The aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreBackground: The strategy for eliminating measles from Iraq includes conducting mass immunization campaign against measles, within the framework of the national strategic plan for the elimination of this disease. Awareness about this campaign is fundamental for their success.Objective: The study aims at finding out the knowledge, attitudes and practices regarding vaccination against measles among two groups of students in two different colleges ( medical and engineering) .To report uptake of Measles vaccine and reasons for declining the vaccine among medical and non-medical students in the campaignMethod: Across sectional study has been conducted at Al-Kindy College of Medicine/ Baghdad University and University of Technology for the peri
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreThe aim of this paper is to study the nonlinear delay second order eigenvalue problems which consists of delay ordinary differential equations, in fact one of the expansion methods that is called the least square method which will be developed to solve this kind of problems.
<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>
The present study is to investigate the possibility of using wastes in the form of scrap iron (ZVI) and/ or aluminum ZVAI for the detention and immobilization of the chromium ions in simulated wastewater. Different batch equilibrium parameters such as contact time (0-250) min, sorbent dose (2-8 g ZVI/100 mL and 0.2-1 g ZVAI/100 mL), initial pH (3-6), initial pollutant concentration of 50 mg/L, and speed of agitation (0-250) rpm were investigated. Maximum contaminant removal efficiency corresponding to (96 %) at 250 min contact time, 1g ZVAI/ 6g ZVI sorbent mass ratio, pH 5.5, pollutant concentration of 50 mg/L initially, and 250 rpm agitation speed were obtained.
The best isotherm model for the batch single Cr(III) uptake by ZVI
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
Leishmaniasis is a group of parasitic diseases caused by Leishmania spp., an endemic infectious agent in developing countries, including Iraq. Diagnosis of cutaneous lesion by stained smears, serology or histopathology are inaccurate and unable to detect the species of Leishmania. Here, two molecular typing methods were examined to identify the promastigotes of suspected cutaneous leishmaniasis samples, on a species level. The first was species-specific B6-PCR and the second was ITS1-PCR followed by restriction fragment length polymorphism (RFLP) using restriction enzyme HaeIII. DNA was extracted from in vitro promastigote culture followed by amplification of kDNA by B6 or amplification and digestion of LITSR/L
... Show More