The Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The developed ANN mode gave a high correlation coefficient reaching 0.927 for the prediction of TDS from the model and showed high levels of TDS in Al-Hawizeh marsh that pose threats to people using the marsh for drinking and other uses. The dissolved Oxygen concentration has the highest importance of 100% in the model because the water of the marsh is fresh water, while Turbidity had the lowest importance.
The Rwandan author of comfort chests and verse pleasure of the most important historians of the Seljuks in the sixth century AH / twelfth century and belongs to the mostly ethnic scientists family has won favor with the Sultans of the Seljuks until he became the most famous Markhém is his main source of research sources with respect to the political and social history the Seljuks and the relationship of the Seljuk sultans of the Abbasid caliphs in Baghdad.
The book included the history of the Seljuks from the time of statehood in the fifth century AH / atheist century AD until the death of the Sultan Tgrl bin Arslan year 590 AH / 1193 AD and then shed Akhawarzmeyen, and touched the author at the end of the book in separate chapters t
Objective: the aim of the study is to assess the knowledge and practices for nurses that working in
words of Ibn Al-kuff hospital for spinal cord injuries.
Methodology: descriptive study from the period of (1st of July to the 30th August 2005) about the
knowledge and practical management when autonomic dysreflexia syndrome affects those patients
whom sleeping in the words of this hospital and its relationship with some variables.
The sample of the study consists of (100) nurses male and females are selected purposively. a
questionnaire check list was designed for study purpose and applied by (test - retest) to improve the
reliability, the validity of the assessment was determined through a panel of experts.
The da
The current trend worldwide is searching plant extracts towards prevention of neurodegenerative disorders. This study aimed to investigate the neuroprotective effect of Alpinia galanga leaves (ALE), Alpinia galanga rhizomes (ARE), Vitis vinifera seeds (VSE), Moringa oleifera leaves (MLE), Panax ginseng leaves (PLE) and Panax ginseng rhizomes (PRE) ethanolic extracts on human neuroblastoma (SHSY5Y) cells. The 1‐diphenyl‐1‐picrylhydrazyl (DPPH) radical scavenging of VSE and MLE were 81% and 58%, respectively. Ferric‐reducing antioxidant power (FRAP) of ALE and MLE (33.57 ± 0.20 and 26.76 ± 0.30 μmol Fe(ΙΙ)/g dry wt., respectively) were higher than for the other extracts. Liquid chromatography coupled to quadrupole time‐of‐fli
... Show MoreThe research aims to design an electronic program that allows users to assess the possibility of different practices for projects management professional according to the PMBOK methodology)) and using the requirements Data mentioned in the "knowledge and experience in project management Evaluation guide" issued by the professional Institute of project management According to the results of this program will be electronic The possible classification of project management in terms of both (proficiency_ perform tasks) as less than the desired level or within or above average in terms of best practices, and finally a number of recommendations to overcome the possible shortcomings. The most important is the need to enrich the service
... Show MoreBackground: To assess the alveolar bone crest level (ABCL) by Cone Beam Computed To-mography (CBCT) and to investigate several variables as predictors for the height of the alveolar bone in adolescents. Materials and methods: Age, sex, and ethnic groups were rec-orded for each patient. CBCT images were used to obtain measurements of the interproximal alveolar bone level from the cementoenamel junction (CEJ) to the alveolar crest. The highest measurement in each sextant was recorded along with any presence of a vertical bone defect or calculus. Results: Total of 720 measurements were recorded for 120 subjects. No vertical bony defects or calculus were observed radiographically. Statistically significant (P< 0.05) differences were observed be
... Show MoreObjective(s): To assess the eating habits of adolescent females with iron deficient anemia.
Methodology: This study employed a quantitative research, descriptive evaluation design.The study was carried out on adolescent girls attending Kirkuk secondary school, period from 11 April to 27 December 2022. A non- probability (Purposive) sample has been applied to obtain the study goals. The study sample was (62) student who participate in the study.
Results: Pre-test results from the study revealed that 54.8% of students had moderate IDA. While the students' iron levels returned to normal in the posttest (53.2%). The majority of students (59.7%) had poor eatin
... Show More
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreA field experiment was implemented during during of crop year 2023-2024 at the Agricultural Engineering Research Station of the University of Baghdad to evaluate the influence of row orientation and planting density on certain growth traits, grain yield, and quality indices of bread wheat cultivars. The experiment was designed as a split-plot arrangement within a randomized complete block design (RCBD) with three replications. The main plots included three wheat cultivars (Iba’a-99, Buhooth-22, and Buhooth-10), while the subplots consisted of three planting densities (80, 100, and 120 kg ha−1), and the sub-sub plots were assigned to two row orientations: East-
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More