Al-Rustamiya sewage treatment plant (WWTP) serves the east side of Baghdad city (Rusafa) and is considered one of the largest projects.It consists of three parts (old project F0, first extension F1, and second extension F2) that treat wastewater and the
effluent is discharged into Diyala river and thus into the Tigris River. These plants are designed and constructed with an aim to manage wastewater to reachIraqi effluent standard for BOD5, COD, TSS and chloride concentrations of 40, 100, 60 and 600
mg/L respectively. The data recordedfrom March till December 2011 provided from Al-RustamiyaWWTP, were considered in this study to evaluate the performance of the plant. The results indicated that the strength of the wastewater entering the plant
varied from medium to high. The average concentrations of the effluent of BOD5, COD, TSS and chloride were within Iraqi effluent standards. The overall efficiency removalswere: For BOD5: 92.1, 90.31, and 92.96% for F0, F1, and F2 respectively COD: 88.23, 87.9, and 87.95% for F0, F1, and F2 respectively TSS: 86.98, 80.72, and 89% for F0, F1, and F2 respectively Chloride: 14.79, 15.37, and 15.31% for F0, F1, and F2 The mean value of BOD5/COD ratio of the raw wastewater was 0.67 as for typical untreated domestic wastes. The mean BOD/COD ratios of the treated sewage from F0 was 0.48, from F1 0.50 and from F2 0.38. These ratios did not confirm with the typical ratios indicating that the wastewaterneeds more treatment
This study tries to clear the correlation and association between asthma, obesity and leptin levels. Also it will work to indicate the main risk factors which play role in the elevation of leptin level within asthmatic patients. This is a case control study conducted on (38) asthmatic patients and (20) healthy control who were closely similar by age, gender and BMI. The main statistical tests used were student t test, linear regression test and correlation test. Significance was set at P < 0.05. Sampling method used for this study was convenience sampling method. The main results of this study show a significant association and positive correlation between age (old age ≥ 40 ye
... Show MoreResearch includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreNew Schiff base and their Mn(II),Co(II),Ni(II), Cu(II) and Hg(II) complexes formed by the condensation of O-phathaldehyde and ethylene diamine (2:1) to give ligand (L1) in the first step ,then the ligand (L1) with 2- aminophenol (1:2) to give ligand (L2) were prepared by classic addition through microwave method . These compounds (Ligands and complexes) have been diagnosed electronic spectra, FT-IR,1H-&13C-NMR (only ligand), magnetic susceptibility, elemental microanalysis and molar conductance measurements. Analytical values displayed that all the complexes appeared (metal: ligand) (1:1) ratio with the six chelation. All the compounds appear a high activity versus four types of bacteria such as; (Escherichia coli), (Sta
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show Moreحضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال
... Show MoreGiven the importance that the Iraqi banking system in general and Islamic banks in particular, there must be effective supervisory oversight of these banks, as supervisory oversight has an essential and effective role in the development and evaluation of the performance of banks, through the application of legal controls and rules. Banking aimed at making sure that its financial centers are safe, protecting depositors' funds, and achieving both monetary and economic stability. This research studied and evaluates the mechanisms and tools used by the Central Bank of Iraq in the supervision and supervision of these banks. Therefore, the research aimed to measure the type and direction of the relationship between the requirements of supervis
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More