This study simulates and assesses the hydraulic features and residual chlorine in Al-Najaf city’s water supply network using WaterGEMS. Field and laboratory work was done to determine pressure heads, velocities, and chlorine residual. Constructed model was validated using field data. Values of RMSE were between 0.08 and 0.1, and 0.05 and 0.06 for pressure and residual chlorine, respectively. The examination of water distribution system (WDS) during peak demand hours indicated that the pump unit’s capacity could not meet the high-water demand, resulting pressure loss with values between 0.1 and 2 bar. Simulated residual chlorine levels ranged between 0.45 and 0.8 ppm.
The current research aims to test the effect of knowledge sharing in its dimensions represented by(individual dimension, organizational dimension, and technological dimension), In reducing the strategic Anxiety of Iraqi Airways, In view of the importance of the two variables for the company from the perspective of society and the sample resulting from directing various organizational phenomena to reduce its strategic Anxiety, As a goal, it should be viewed from multifaceted perspectives(uncertainty, relational disorder, competitive disorder, resource depletion), And it was embodied by choosing the descriptive, exploratory approach, as it is the most appropriate in that aspect, so that the research questionnaire is one of solid scientific
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreThe extract of fig fruit has shown significant medical usefulness in various fields. The entrance of nanotechnology into the field of medicinal and pharmacology has shown remarkable advantages. Plants contain diverse molecules thatcan reduce metals, and provide a safe, eco-friendly approach for synthesizing nanoparticles. Iron oxide nanoparticles (IONPs) have been reported to possess an antimicrobial effect against some strains of bacteria and moulds. We have aimed to synthesize IONPs from fig fruit extract and investigate the influence of fig extract and IONPs in wound healing of mice. UV-Vis spectroscopy, X-ray diffraction (XRD), and field emission scanning electron microscopy were used to characterize the IONPs that were produced
... Show MoreLanguage always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreBackground: One of the significant public health problems is the traumatic dental injury to the anterior teeth, it has a great impact on children’s daily. Physical and psychological disturbance, pain and other negative impacts, such as tendency to avoid laughing or smiling may be associated with traumatic dental injuries, that may affect the social relationships. To determine the occurrence of traumatic dental injuries in relation to quality of life, this study was established among children of primary schools. Material and Methods: A cross-sectional study was conducted among private (574) and governmental (1026) primary school children in Baghdad city. Dental trauma was assessed according to Ellis and Davey classification in1970
... Show MoreThe researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data. &
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More