The Geographic Information System (GIS) is considered one of the most prominent programs used to collect, analyze, display, process, and produce geographic information maps for a specific purpose. It is also considered one of the modern database programs. Additionally, we can perform statistical analysis within GIS on predefined data to produce quantitative results. In this study, data was collected from more than 80 engineering projects established in Baghdad City from soil investigation reports for the projects. Geographic information systems were used to produce objective maps showing the variation in the bearing capacity of shallow foundations in the soil of Baghdad Governorate. It demonstrates the importance of GIS exploration for more valuable results such as the bearing capacity of shallow foundation from the results of Standard Penetration Tests (SPT) showed in the soil of Baghdad Governorate. The total number of boreholes excavated was 150, irregularly distributed in Baghdad city. Three SPT tests were performed in each boreholes at depths of 1.5, 6 and 9 m measured from the existing ground level (EGL). The study concluded by producing objective maps that show the variation in bearing capacity of soil for all area of the Baghdad city for the aforementioned depths. These maps can be used by different local authorities to predict the bearing capacity of the soil and choose the appropriate type of foundation for each soil. We can also use it to assess the foundations of existing and irregular buildings and assess the extent of the risks of failure and collapse.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreSkin drug administration is the method used to provide drugs for local or systemic therapy, which is recognized for clinical usage. It is the third-largest method of medication delivery, after only intravenous administration and oral administration. Using a transdermal delivery method makes the administration easy, and blood concentration and adverse effects can be reduced. A microneedle is a micron-sized needle with a short height of no more than 500 micrometers and a width of no more than 50 micrometers. The needle comes into contact with the epidermal layer of the skin before it gets to the dermal layer, where there is no discomfort. Several materials, such as metals, inorganic, and polymer materials, are used to create microneed
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continued development and widespread deployment of web journalism. This research belongs to descriptive studies which depends on sample survey approach adopted by five-meter design measuring trends. It contains 28 items having applied honesty and reliability transaction and the scale form is distributed to the sample studied of about 110 professors and then the researcher collects them and then applying the appropriate statistical program to get the results. This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continu
... Show MoreSeveral million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up t
... Show MoreSeveral million tons of solid waste are produced each year as a result of construction and demolition activities around the world, and brick waste is one of the most widely wastes. Recently, there has been growing number in studies that conducted on using of recycling brick waste (RBW) to produce environmentally friendly concrete. The use of brick waste (BW) as potential partial cement or aggregate replacement materials is summarized in this review where the performance is discussed in the form of the mechanical strength and properties that related to durability of concrete. It was found that, because the pozzolanic activity of clay brick powder, it can be utilized as substitute for cement in replacement level up to 10%. Whereas,
... Show MoreAn epidemiological study in Al-Mahmmodiya (50 km south Baghdad) to investigate a possible vector of Leishmaniasis were applied .This region is considered as a foci of Leishmaniasisaccording to the health association statistics. CDC light traps were used to collect the insects nightly. Insects were collected by Indoor application as human dwellings and animal shelters and Outdoor application as rodent's barrows and field trees. Sand flies were transported to the laboratory, isolated and identified according to the identification keys in Tropical Biological Researches Unit at the Collage of Science / University of Baghdad. Must of the collected sand flies were belonging to three species PhlebotomuspapatasiScopoli(45%), PhlebotomusalexandriSin
... Show MoreBackground:- Cholesterol is high in ascetic fluid due
to malignancy and other causes of exudates.
Objective:-To use cholesterol as a marker to
differentiate between exudative and transudative
ascetic fluid and to compare that with other routine
parameters.
Methods:-Twenty eight patients were included in this
study 17 females with mean age of 41.9 years, 11
males with mean age of 48.2 years. The patients were
divided in group I suspected transudate, and group II
suspected exudate according to history and clinical
examination.
Ascetic fluid samples were sent for total protein,
albumin, and cholesterol measurement blood samples
were sent for serum protein and albumin measurement.
Results:-In this
Some children are suffering from introversion in kindergartens , so it must be confront and obviated by specialists because it will inevitably lead to unsatisfactory results reflect negatively on the individual and the community together . And the introvert child is a miserable child incapable of social interaction or give - and - take with colleagues , lack of integration of the child to life leads to the obstruction of participation with his peers in various activities. Introversion causes a real emotional deficit to the children of kindergartens which limits of possibility of their intellectual development and mental growth and that because of their isolation and poor focus in education
... Show More