After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of blast. Accordingly, must been have adopted a changing philosophy to provide appropriate and effective protection for preservation of psyche and building occupants, by establishment of a protected perimeter and the design of a debris mitigating facade, the isolation of internal explosive threats that may to dodge detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. By reason of this above-mentioned, the study simple contribution of determined phenomena risk containment. Moreover, in this study may be applied remote sensing (RS) and geographic information system (GIS) techniques to estimation the blast wave overpressure of bomb explosive effecters for damage that building of materials (i.e., facade, building glass, secondary of roof, fashioning tools and furniture), and how avoid this problem, therefore, selection justice ministry of Iraq building in Salehyiea region at Baghdad city, it destroyed at 28/10/2009 by motocar bombs explosion.
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreObjectives: To assess the information of mothers regarding asthmatic child care, and to find out the relationship between information of mothers and some of demographic characteristic such as age of mothers, Level of education, and away of child feeding. Methodology: Quantitative design (a descriptive study) was conducted in pediatric hospital in Kirkuk city from the period of first of July 2011 to the end of March 2012. To achieve the objectives of the study, non probability sample of (50) mothers having asthmatic children who attend to the pediatric hospital. The data are collected through utilization
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreAbstract
Drug information resources are the information that is used in medications discovery, utilization, and management. Little information about different types of resources used by Iraqi community pharmacists is known. Therefore, the objectives were to determine drug information resources' type do the pharmacists used and the common drug information questions they faced during their work in community pharmacy. A cross-sectional descriptive study was conducted in different Iraqi provinces and online self-reported survey was introduced through Google Form Software to an appropriate sample of graduated pharmacists who were working in a private community pharmacy and having at least one
... Show MoreIn this study, dead and live anaerobic biomass was used in biosorption of Pb(II), Cr(III) and Cd(II) ions from a synthetic wastewater. The biosorption was investigated by batch adsorption experiments. It was found that, the biosorption capacities were significantly affected by biosorbent dosage. The process follows Langmuir isotherm (regression coefficient 0.995, 0.99 and 0.987 for Pb(II), Cr(III) and Cd(II) ions, respectively, onto dead anaerobic biomass) model with uniform distribution over the biomass surface. The experimental uptake capacity was 51.56, 29.2 and 28 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto dead anaerobic biomass, compared with 35, 13.6 and 11.8 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto live
... Show MoreThis research introduces a developed analytical method to determine the nominal and maximum tensile stress and investigate the stress concentration factor. The required tooth fillets parametric equations and gears dimensions have been reformulated to take into account the asymmetric fillets radiuses, asymmetric pressure angle, and profile shifting non-standard modifications. An analytical technique has been developed for the determination of tooth weakest section location for standard, asymmetric fillet radiuses, asymmetric pressure angle and profile shifted involute helical and spur gears. Moreover, an analytical equation to evaluate gear tooth-loading angle at any radial distance on the involute profile of spur and hel
... Show MoreIn this paper the effect of nonthermal atmospheric argon plasma on the optical properties of the cadmium oxide CdO thin films prepared by chemical spray pyrolysis was studied. The prepared films were exposed to different time intervals (0, 5, 10, 15, 20) min. For every sample, the transmittance, Absorbance, absorption coefficient, energy gap, extinction coefficient and dielectric constant were studied. It is found that the transmittance and the energy gap increased with exposure time, and absorption. Absorption coefficient, extinction coefficient, dielectric constant decreased with time of exposure to the argon plasma
Abstract
The basic aim of this research is to study the interactional effect of investing information technology on the relationship between value added intellectual capital and financial performance as literature review suggested on the theoretical level, including previous studies, with the deduction of its trends strongly predicted by research hypotheses and their content associated with the investment in intellectual capital after information technology tools being employed in this direction to improve the financial performance of the studied companies at the levels of both industrial and service sectors, a non-random sample was chosen included (40) forty Iraqi Joint-Stoc
... Show More