The Department of Chemical and Biological Engineering, Al-Khwarizmi College of Engineering at Baghdad University has lately renovated its own research laboratories to comply with international safety measures and conduct undergraduate and postgraduate research. In this regard, the department has harnessed some amenities within the college to establish these laboratories taking into accounts creating a convenient, safe, and developed working environment for both researchers and students. A precise procedure was followed to establish this laboratory which includes providing new bench tops which offer spacious working places for workers. These benches were supplied with power points, gas, water, and compressed air outlets. In addition, the laboratories were provided with fume hoods, fire extinguishers, and other auxiliary safety tools. For all that, an inspection conducted by experts to these laboratories showed some major and minor faults which need to be taken into considerations to ensure safety for all workers within these amenities.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Background: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos
... Show MoreThis study aims to focus on the Motives behind volunteer work among a sample of volunteers working in civil society organizations and check if there are statistical differences with those variables according to (gender, age, job, period of volunteer work, and residence. The sample consists of (220 )volunteers,(189) male and(31) female from southern, northern and central governorate .The Volunteer Functions Inventory(VFI)(Clary & et al,1989)was applied, It consisting of(30) items with six fields( Values, Understanding, Social motives, Career, Protective, Enhancement).
The results show that the most common and important motivations are (Values, Understanding, and social motivations), there are differenc
... Show MoreMarriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreAniera desert/cola was found new to science and to the Iraqi fauna. The description was
mainly based on external features and male genit
Lorraine Hansberry’s A Raisin in the Sun (1959) appeared at the beginning of renewed political activity on the part of the blacks; it is a pamphlet about the dream of recognition of black people and the confusion of purposes and means to reach such recognition. It embodies ideas that have been uncommon on the Broadway stage in any period. Situations such as a black family moving into an all-white neighborhood were not familiar before this time; they were just beginning to emerge. In depicting this so realistically, Hansberry depends more on her personal experience as an African American embittered by social prejudices and discrimination.
The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in