In the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009) to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality parameters along the river have been represented by graphs using Excel.2013 software. The results revealed that the quality of the Euphrates River ranges from “Good” to “Poor”, it enters the Iraqi borders with “Good” water quality and gradually its quality begins to decrease after it receives pollution from many sources such as domestic sewage and different industrial effluents until its quality becomes “Poor” according to the proposed classification. Finally the proposed WQI can be used as a tool to assess the quality of the river with both place and time.
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit
... Show MoreIn this paper, the concept of a hyper structure KU-algebra is introduced and some related properties are investigated. Also, some types of hyper KU-algebras are studied and the relationship between them is stated. Then a hyper KU-ideal of a hyper structure KU-algebra is studied and a few properties are obtained. Furthermore, the notion of a homomorphism is discussed.
Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.
Owing to their remarkable characteristics, refractory molybdenum nitride (MoN x )-based compounds have been deployed in a wide range of strategic industrial applications. This review reports the electronic and structural properties that render MoN x materials as potent catalytic surfaces for numerous chemical reactions and surveys the syntheses, procedures, and catalytic applications in pertinent industries such as the petroleum industry. In particular, hydrogenation, hydrodesulfurization, and hydrodeoxygenation are essential processes in the refinement of oil segments and their conversions into commodity fuels and platform chemicals. N-vacant sites over a catalyst’s surface are a significant driver of diverse chemical phenomena. Studies
... Show MoreIn this paper we find the exact solution of Burger's equation after reducing it to Bernoulli equation. We compare this solution with that given by Kaya where he used Adomian decomposition method, the solution given by chakrone where he used the Variation iteration method (VIM)and the solution given by Eq(5)in the paper of M. Javidi. We notice that our solution is better than their solutions.
God urged to read the Holy Qur’an and to ponder it is commanded, and the Most High said: That they ponder over His verses and that those with insights remember ().
And this book that God Almighty sent down to the heart of His Prophet, peace and blessings be upon him, is as clear as the sun and the moon.
It is a book of guidance and the constitution of a nation that is the best nation brought forth for mankind, and God has taken care of its preservation as He said: We have sent down the Remembrance, and we are its guardians.
This has been chosen for this topic (Luqman's commandments to his son) for what we see today in our time and society from the loss of morals and values and the neglect of parents to their chi
In this study, we present a new steganography method depend on quantizing the perceptual color spaces bands. Four perceptual color spaces are used to test the new method which is HSL, HSV, Lab and Luv, where different algorithms to calculate the last two-color spaces are used. The results reveal the validity of this method as a steganoic method and analysis for the effects of quantization and stegano process on the quality of the cover image and the quality of the perceptual color spaces bands are presented.
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show Moreعند إطلالتنا على هذا البلد العربي لابد من التقصي ولو بعجاله عن اقتصاده وهو الاهم باعتبار ان الاقتصاد هو شريان الحياة لأي أمة فلا غنى ولا تهاون في نفس الوقت عن هذا الجانب المهم الذي يرتبط مدى تطوره بتطور البلد وهذا الاخير مرتبط بما متوفر لديه من موارد بشريه ومادية وان تفاوتت النسبة بينها فلا ضير في ذلك فالاهم هو وجود الموجه والمخطط بالاتجاه الصحيح نحو الاستغلال الامثل لهذه الموارد
(وان قلّتْ) وبالتالي