Huwaiza marsh is considered the largest marsh in the southern part of Iraq. It is located between 31° and 31.75° latitude and extends over the Iraqi-Iranian border; but the largest part lies in Iraq. It is located to the east of Tigris River in Messan and Basra governorates.
In this research, the variation of some water quality parameters at different locations of Huwaiza marsh were studied to find out its efficacy in the treatment of the contamination coming from the wastewater outfall of Kahlaa brokendown sewage treatment plant which lies on the Kahlaa River. This rive is the main feeder of Huwaiza marsh. Ten water quality sampling locations were chosen in this marsh. The water samples were taken during 2009 for three months; January, April and August representing winter, spring and summer respectively.
The results of water quality analyses showed that Kahlaa untreated sewage had a negative impact on the water quality of Huwazia marsh; especially in its upstream region. Analyses of water samples taken from the middle and downstream end of the marsh showed that the marsh water is safe for fishing and swimming in these regions.
This study is an attempt to investigate the conceptual metaphor of UP and DOWN commonly used in Iraqi community. Some of the metaphorical expressions in Iraqi colloquial Arabicarewidely used by Iraqi speakers in everyday language. Ithas been analyzed by following the cognitive theory of metaphor (Lakoff& Johnson,1980).The study indicates that the Iraqi speakerexperiences more of the metaphorical expressions of UP and DOWN to referto many of the abstract concepts that shape his/her impression of everyday life situations.
اعداد : أسرار عبد الزهراء علي - علاء الدين - ب. جواد حسن عودة عبد الله - جامعة بغداد جامعة بغداد كلية البصرة للعلوم والتكنولوجيا - كلية الإدارة والاقتصاد. كلية الإدارة والاقتصاد المركز الديمقراطي العربي – مجلة القانون الدستوري والعلوم الإدارية : العدد التاسع شباط – فبراير 2021 المجلد 3 ،
In this paper, we propose an approach to estimate the induced potential, which is generated by swift heavy ions traversing a ZnO thin film, via an energy loss function (ELF). This induced potential is related to the projectile charge density, ρq(k) and is described by the extended Drude dielectric function. At zero momentum transfer, the resulting ELF exhibits good agreement with the previously reported results. The ELF, obtained by the extended Drude model, displays a realistic behavior over the Bethe ridge. It is observed that the induced potential relies on the heavy ion velocity and charge state q. Further, the numerical results show that the induced potential for neutral H, as projectile, dominates when the heavy ion velocity is less
... Show MoreReflective cracking is one of the primary forms of deterioration in pavements. It is widespread when Asphalt concrete (AC) overlays are built over a rigid pavement with discontinuities on its surface. Thus, this research work aims to reduce reflection cracks in asphalt concrete overlay on the rigid pavement. Asphalt Concrete (AC) slab specimens were prepared in three thicknesses (4, 5, and 6 cm). All these specimens were by testing machine designed and manufactured at the Engineering Consulting Office of the University of Baghdad to examine for the number of cycles and loads needed to propagate the reflection cracking in the asphalt concert mixture at three temperatures (20, 30, and 30°C). It was noticed that the higher thickness A
... Show MoreWe present the notion of bipolar fuzzy k-ideals with thresholds (
Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreA binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show More