The ground level ozone concentration at different locations in Baghdad city was identified. Five
different sites have been chosen to identify the ground level ozone concentration. Al- Dora and Al-
Za'afarania were chosen as areas contained point source ( power plant station ) in addition to high traffic
load , while Al –Uma park, Aden square and Al-Mawal square were chosen as area contained heavy
traffic only (line source). The measurement focuses on spring and fall because these periods display
favorable meteorology to ozone formation. During the research period the maximum values (peaks) for
ground level ozone concentration were observed at fall: at Al-Za'afarania area 101ppb as an average, at
Al-Dora 87 ppb as an average and at line source areas 48 ppb as an average. Among the line sources area
Al-Mawal square represent the highest peak value at fall 68 ppb. At spring the peaks of ozone
concentration observed to be at the same height, 50 ppb for all sites. The downwind sites from the power
plant stations at Al-Dora and Al-Za'afarania areas record higher ozone peaks compared with up wind
sites. It can be concluded that the effect of power plant stations in forming ozone is larger than traffic
load.
The comparison between the ground level ozone concentrations that measured during the research period in spring and fall, and the ambient air quality standards (AAQS) shows that:
• No exceeded levels were observed in spring for all sites.
• In fall the AAQS for ozone was exceeded in Al-Za'afarania area at 12: PM, 1: PM, 2: PM and 3:
PM, and in Al-Dora at 2: PM.
The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreThis study aimed to isolate and phenotype lymphocytes in untreated children patients with chronic allergic asthma. To reach such aim the study involved (25) patients from children (17 male and 9 female) whom their ages where between (3-10) years, in addition to (15) apparently healthy children (9 male and 6 female) in the same ages involved as control group. The data demonstrated that there was a significant increase in the mean percentages of T-lymphocytes (CD3+ cells) in the peripheral blood of patients (66.75±0.29)**, in comparison with control group (43.58±0.19), a significant increase in the mean percentages of T-helper lymphocytes (CD4+ cells) in the pe
... Show MoreThe study aims to identify the Traumatic Symptoms (physiological, emotional, and cognitive) of earthquakes among the targeted sample; it also aims to identify the significant differences between psychological, emotional, and cognitive traumatic symptoms of earthquakes according to the gender and age of participants. The study additionally seeks to identify thepsychological positive-negative reactions associated with earthquakes according to gender and age of the participants. To measure the traumatic symptoms of earthquakes, a 4-point Likert scale questionnaire with (20) items (questions) accompanied with a 4-point Likert scale questionnaire with (18) items (questions) were used to measure the Psychological positive-n
... Show MoreIt is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of infection in some situations does not outweigh the risks which attend the administration of even the safest antibiotic drug. The aim of this study was to comp
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreEvery cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreDemography or population studies or demography is the science that is based on the different characteristics of the population scientific study, and represent a population studies principled way to understand the population of society, in addition to verification of the population in a given area determine the reason for the increase or decrease this number from the previous statistical As these studies estimate future trends for the occurrence of demographic change in terms of birth, death and migration That the registration of deaths of paramount importance narrated that way can the demographic reality of the population analysis, and coverage of the health authorities' needs and enable government institutions of decision-making
... Show MoreRefuse derived fuel (RDF) is considered one of the most important types of low cost thermal energy which can be tapped in the industry, especially the cement industry in particular being the need of high thermal energy during the production processes, and in this paper we have implemented the use of a derivative of the fuel RDF as a substitute for gasoline , to reduce production costs and thereby achieve production efficiency, and the methodology used in this research statistical analysis as well as the use of the cost of kaizen target for the purpose of reducing costs and achieve production efficiency, and this has reduced the cost total cement production by which led to reduce total costs of cement production by 8.4% and an incre
... Show More