The Al Mishraq site has been the subject of many scientific studies for the period before and
after the fire in 2003. Five visits to the site were conducted twice in 2003 for general fact-finding, twice
in 2004, and once in 2005 for detailed sampling and monitoring. Desk-based research and laboratory analysis of soil and water samples results indicate that surface water and groundwater pollution from Al Mishraq site was significant at the time of its operation. The primary pollution source was the superheated water injection process, while the principal receptor is the River Tigris. Now that the plant is idle, this source is absent. Following the June 2003 sulphur fire, initial investigations indicate that short damage to
vegetation was severe close to the plant but there is no evidence of widespread or significant long-term
damage. Rainwater and drainage ponds and gullies close to the sulphur processing and acid contain
hazardous levels of acid. Runoff from these areas may be affecting local water quality. There is regional moderate groundwater contamination by sulphate and hydrogen sulphide, but much of this may be naturally sourced. The site in its current state represents a low risk to human health and the environment
principally due to the acidic surface water ponds, but in the absence of corrective action, the hazard
levels may be elevated after some decades.
In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreTwenty isolates of Serratia marcescens were isolated from inflammation of the urinary tract (UTI)., These isolates were found to produce hemolysin as indicated by blood agar plates in which the hemolysis of red blood cell indicate a positive result. Isolates were selected according to their hemolysis activity by measuring absorbance of hemoglobin at 405 nm that released from red blood cell. Hemolysin was completely purified using 50-75% saturation of ammonium sulphate followed by ion exchange chromatography with DEAE-cellulose then gel filtration chromatography by sepharose 4B. Accordingly molecular weight for the purified toxin was estimated as 45 KD.
Endoglucanase produced from Aspergillus flavus was purified by several steps including precipitation with 25 % ammonium sulphate followed by Ion –exchange chromatography, the obtained specific activity was 377.35 U/ mg protein, with a yield of 51.32 % .This step was followed by gel filtration chromatography (Sepharose -6B), when a value of specific activity was 400 U/ mg protein, with a yield of 48 %. Certain properties of this purified enzyme were investigated, the optimum pH of activity was 7 and the pH of its stability was 4.5, while the temperature stability was 40 °C for 60 min. The enzyme retained 100% of its original activity after incubation at 40 °C for 60 min; the optimum temperature for enzyme activity was 40 °C.
The manufacturing industry in Iraq has faced, during the time stages, several obstacles that have had devastating effects on the Iraqi economy. These obstacles are represented by political events and wars that have led to the depletion of most human and material resources and the suspension of most vital industrial facilities from working, And the occurrence of this major deviation in the process of economic development, For the same reasons, the contributions of the manufacturing sector to the gross domestic product varied fluctuatingly, indicating instability in the growth rates of this sector, On the other hand, the supremacy of the belief that the dominance of oil resources as a main source for creating economic growth and achieving a h
... Show MoreThis study aims to study the effect of gout disease on complete blood picture and biochemical parameters and some non-enzymatic antioxidants, some tracing elements and lipid peroxidation ,in outpatients with gout disease at Al-Ramadi Teaching-Hospital ,Al-Razi Hospital and the study duration from Octo.2013-to May 2014.(50) blood samples were collected from patients with age groups (30-80 years) from both sexes (28 males,22 females),a (30) blood samples (15 males,15 females) were collected from normal individuals as a control group with age groups (27-75 years). Hematological measurement showed no significant differences in size compressed blood cells, the percentages in ( 45.15 +4.99 and 46.87+6.30) % in patient and control groups respect
... Show MoreAbstract
The aim of this research is to identify the effectiveness of thinking skills in developing the life skills of the students of the first Academic year, particularly the differences in life skills according to the variable of study specialization (human-scientific). To achieve the research objectives, the life skills scale was constructed on the classification of (WHO). The psychometric properties of the scale were examined. The validity of the scale, which is the final form of (60) items, was valid for measuring the life skills. The scale was then applied to the research sample of (112) students of the first year of the University of Bisha. The SPSS program processed
... Show MoreThe research aims to clarify the role that psychological ownership, through its dimensions, plays in deterring the effects of toxic leadership, through its dimensions, in the Ministry of Industry and Minerals. The research started with a basic problem represented by the following question: "Using psychological ownership and its application in deterring the negative effects of toxic leadership." The research used the descriptive-analytical method. The sample was randomly selected from workers in some selected companies affiliated with the Ministry of Industry and Minerals in Baghdad, and the sample size reached 124 individuals. One of the most important results is that there is an effect of the psychological ownership variable, based on the
... Show MoreBackground; paraphilias were studied in the sex
clinic, at Al-Rashad teaching mental hospital, in the
years 2009-2010, a subject never touched before in the
field of psychiatry in Iraq.
Aims of the study :
1-to identify the prevalence of types and number of
paraphilias in those patients.
2-to study the relationship of paraphilias with
sociodemographic factors of the patients.
Patients and methods; using the diagnostic criteria of
DSM IV TR, 52 patients from the outpatient sex clinic
at Al-Rashad mental hospital, collected and studied (41
males and 11 females).
Results; the ratio of men to women was 3.7 : 1, the
majority of our sample was in the age range of 21-30
years (36.35%), with a limited
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More