The Study was achieved adjectives physical and chemical water wells in the district of
Samarra , where a study has 42 sample groundwater in different regions of the judiciary
randomly distributed all over the judiciary and examined in vitro.
The study showed that the quality of groundwater in the general area of study
Kipritateh punctuated Klordih water quality and other quality Bicarboonatih.
Varied the key components of groundwater in the study area in concentrations
between periods of rain and drought, especially because of the cation ion exchange processes
as well as mitigation as a result of filtering rain water and dominated the calcium ion,
followed by sodium.
As for the negative ions has dominated ion sulfate, followed by chloride on the rest of
the ions as a result of melting rock Gypsum CaSo4.2H2O which have the ability to melt into
the water as the melting of this layer with water leads to high salinity due to increased ion
concentration sulfates as they reach the amount of dissolved salts to more than 15,000 mg / l
and in this case the water becomes unfit for agricultural use, but for the secondary ions
deemed to nitrate ion secondary ions of the most important wells in the study area has
exceeded the permissible limits Iraqis and internationally.The study showed that the majority of groundwater within the study area is not
suitable for various uses Kalshrb for humans and animals, agriculture and industry
classifications used by the internationally recognized, but some of them can be used after
treatment and for specific purposes.
Concert place high school in the community Keep pace with societal change and what is going through Iraqi society from the wars and occupation and the sectarian and ethnic conflict and authoritarian policies and Dictator ship .
This is the circumstance of the most important historical stages that require .
Precision sons is Keep up with the progress and development and the advancement of the educational march .
The school is a social institution that organizes the members of society all walks of life and their habitats working on crafting members of the extraordinary alve of progress At the multiplicity of functions and tasks school pequires members qualified scientific and practical Becomes complementary members seek progress a
The research aims to indicate the relationship between lean production tools included seven {constant improvement , and Just in time (JIT), and the production smoothing , and quality at the source, and standardized work, Visual management, and activities 5S } and Mass Customization strategy for the model (Pine & Gilomer, 1997) {collaborative, adaptive, cosmetic, transparent}, as well as providing a conceptual framework and applied for variables search to clarify how they will choose a Mass Customization strategy through the lean production tools, , and recognize the reality of the practices of Iraqi industries in such a field. Moreover, aims to highlight the positive aspects that accrue to companies a
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn this work the parameters of plasma (electron temperature Te,
electron density ne, electron velocity and ion velocity) have been
studied by using the spectrometer that collect the spectrum of
plasma. Two cathodes were used (Si:Si) P-type and deposited on
glass. In this research argon gas has been used at various values of
pressures (0.5, 0.4, 0.3, and 0.2 torr) with constant deposition time
4 hrs. The results of electron temperature were (31596.19, 31099.77,
26020.14 and 25372.64) kelvin, and electron density (7.60*1016,
8.16*1016, 6.82*1016 and 7.11*1016) m-3. Optical properties of Si
were determined through the optical transmission method using
ultraviolet visible spectrophotometer with in the range
(
500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreObesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.
In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t
This study tries to clear the correlation and association between asthma, obesity and leptin levels. Also it will work to indicate the main risk factors which play role in the elevation of leptin level within asthmatic patients. This is a case control study conducted on (38) asthmatic patients and (20) healthy control who were closely similar by age, gender and BMI. The main statistical tests used were student t test, linear regression test and correlation test. Significance was set at P < 0.05. Sampling method used for this study was convenience sampling method. The main results of this study show a significant association and positive correlation between age (old age ≥ 40 ye
... Show MoreBackground: Polymorphisms in the TNF-α gene affect the development and progression of rheumatoid arthritis. Objective: To investigate the associations between (-806 T/C) and (-857 T/C) SNPs with rheumatoid arthritis severity and susceptibility in a sample of Iraqi patients. Methods: A case-control study was conducted in Baghdad, Iraq. Twenty healthy controls and 63 patients confirmed to be newly diagnosed with rheumatoid arthritis were included. Those are divided into two groups (patients and controls), and the patients were further subdivided into severe and mild-moderate groups. Samples from those participants were analyzed for clinical and inflammatory parameter measurements. Genotyping by the Sanger method was performed to stu
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More