The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parameters for 10 sampling times. Obviously, with the increasing number of parameters, the value of the index will change. To minimize the effect of eclipse that arises in WQI and to solve the problem of overlapping quality and pollution, this study has created another index linked with IQWQI, which included both the quality and the degree of pollution. The second index is called the Environmental Risk Index (ERI), where only the variables that exceed the permissible environmental limits were included. Sensitivity Analysis was done to predicate IQWQI and to determine the most influential parameters in the IQWQI score; two types of models were chosen for the run of the sensitivity test, which are the Artificial Neural Network Regression (ANNR) and Backward Linear Regression (BLR). The results of IWOI and ERI for freshwater use during the dry season were very poor water quality with a high degree of risk. While in the wet season, both indices' values ranged from poor water quality to very poor water quality with a high degree of risk.
The aim of this work is to evaluate some mechanical and physical
properties (i.e. the impact strength, hardness, flexural strength,
thermal conductivity and diffusion coefficient) of
(epoxy/polyurethane) blend reinforced with nano silica powder (2%
wt.). Hand lay-up technique was used to manufacture the composite
and a magnetic stirrer for blending the components. Results showed
that water had affected the bending flexural strength and hardness,
while impact strength increased and thermal conductivity decreased.
In addition to the above mentioned tests, the diffusion coefficient
was calculated using Fick’s 2nd law.
This study experimentally investigated Free-Fall Gravity Drainage (FFGD) under combination-drive conditions in a two-dimensional Hele-Shaw model representing a water-drive reservoir. An initially high gravity potential from the oil column enabled early oil drainage before aquifer support became dominant. Three water-drive strengths were tested, demonstrating that a stronger aquifer (1.15 psig) accelerated oil recovery to approximately 75% of the original oil in place (OOIP) within 60 minutes, resulting in a final recovery of 79.5%. However, this was accompanied by rapid water breakthrough after 2.5 minutes and high-water cuts exceeding 90%. In contrast, a weaker aquifer (0.725 psig) stabilized the oil–water contact, delaying w
... Show MoreStudy of Direct Marketing techniques and determining the scope of the suitability of each of them in the application in the Iraqi market - An analytical and explorative study for sample of views for wholesaler in Baghdad. The essential idea of the research is to go into the most important concepts which have been mentioned in the direct marketing and determining its current and most important techniques and knowing the scope of applying these techniques in Baghdad main markets (Karrada, Jamilah, shorja, Baya area, zeyouna and new Baghdad) and which of those techniques most applicable in these markets. The research took a sample of (100) wholesalers who practice the activities of selling nutritional items, auto and outs spare part
... Show MoreThe permeability estimates for the uncored wells and a porosity function adopting a modified flow zone index-permeability crossplot are given in this work. The issues with implementing that approach were mostly crossplots, due to the influence of geological heterogeneity, did not show a clear connection (scatter data). Carbonate reservoir flow units may now be identified and characterized using a new approach, which has been formally confirmed. Due to the comparable distribution and flow of clastic and carbonate rock fluids, this zoning method is most effective for reservoirs with significant primary and secondary porosity. The equations and correlations here are more generalizable since they connect these variables by combining cor
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreRetained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More