This study simulates and assesses the hydraulic features and residual chlorine in Al-Najaf city’s water supply network using WaterGEMS. Field and laboratory work was done to determine pressure heads, velocities, and chlorine residual. Constructed model was validated using field data. Values of RMSE were between 0.08 and 0.1, and 0.05 and 0.06 for pressure and residual chlorine, respectively. The examination of water distribution system (WDS) during peak demand hours indicated that the pump unit’s capacity could not meet the high-water demand, resulting pressure loss with values between 0.1 and 2 bar. Simulated residual chlorine levels ranged between 0.45 and 0.8 ppm.
Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreAbstract:
This research aims to identify the actual reality of the supply chain processes applied in the Noor Al-Kafeel Food Products Company, which was chosen as a research sample by measuring the application and documentation gap. The current research relies on the case study method to reach the desired results, and the seven-scale scale was relied on to identify the reality of the supply chain operations applied in the researched company and the use of quantitative and qualitative methods in data collection and analysis, as quantitative methods such as the arithmetic mean were used weighted, percentage measurement, and g
... Show MoreAdverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreIn our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .
Objective(s): To find out the incidence Rate of abortions in pregnant women Admitted Maternal and pediatric Hospitals at Al-Diwaniyah City and to identify the relationship between the incidence rate of abortion and the associated risk factors that led to the occurrence of abortion.
Methodology: A descriptive study was conducted to identify the Incidence Rate of Abortions and its Associated Factors among Women at AL-Diwaniyah City’s Maternity and pediatric Hospital from 16 September 2020 to 16 March 2021 . The sample study includes (100) pregnant women with abortion out of (3800) pregnant women. The data was collected by means of a questionnaire through a personal intervie
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.