Groundwater is an essential source because of its high quality and continuous availability characterize this water resource. Therefore, the study of groundwater has required more attention. The present study aims to assess and manage groundwater quality's suitability for various purposes through the Geographical Information System GIS and the Water Quality Index WQI. The study area is located in the city of Baghdad in central Iraq, with an approximate area of 900 , data were collected from the relevant official departments representing the locations of 97 wells of groundwater in the study area for the year 2019, as it included physicochemical parameters such as pH, EC, TDS, Na, K, Mg, Ca, Cl, , and . It used (kriging method) in the geographic information system to generate the groundwater physical and chemical parameters' spatial distribution and the water quality index map. To estimate the water quality index, ten parameters were considered pH, TDS, Na, K, Mg, Ca, Cl, , , and . The estimated WQI value for groundwater samples in the study area ranges from 50 to 300. Based on the analysis, most of the area under study falls approximately 70% in poor water class and 30% in good water class, where the distribution of the groundwater samples with respect to their quality classes such as excellent, good, poor, very poor and unfit for human drinking purpose, was found to be 3 %, 30 %, 33 %, 12 %, and 20 %, respectively.
Abstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.
Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
Background: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreIraqi economy has grown rapidly. Iraqi citizen, therefore, should be very much involved with the comprehensive development after his long patience. Such development should begin with him and his family to get the housing commodity, which is indeed not a cheap one.
In this regard, the Iraqi legislator drew attention to the necessity of issuing housing finan
... Show MoreThe research aims to identify the rates of hair loss during pregnancy and lactation and its relation to the rates get some elements motivator urged through the results of the continued failure to meet the need of daily assessments of these elements, which led to the continuation of Hair Loss
Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad, and upon his family and companions as a whole. Now, the research deals with the grammatical issues mentioned in the Book of Al-Zahir in the meanings of people's words to Abu Bakr Al-Anbari (d. 328 AH). Two parts of the book have more than one edition, it was printed by the Iraqi Ministry of Culture and Information Beirut in 1979 AD, and the Al-Resala Foundation issued the second edition in 1992 AD The third edition was printed in Dar Al-Bashaer in Damascus in the year 2003 AD and it was the reliance on the research and the grammatical issues were arranged on topics that are: interrogation - Deletion, exclusion, marbling, call and Wallace Relief and
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More