Geographic information system (GIS) is utilized in a variety of tasks such as, resource management, urban planning, emergency planning in case of accident, and rapid response etc. The aim of this study is to produce a digital map with the aid of GIS and a survey data. A survey data is conducted with Total Station technique on sanitary planning positions. The campus of Baghdad University is chosen to test the execution and accuracy of the results for sewer manholes locations. During the field survey, Total Station (Nikon Nivo) is used to identify the 3-D coordinates for each location. Finally, Geographical Information System (GIS) are utilized to present the digital map of the network sewer pipe line to the end users. Although Geographic Information System survey has many advantages compared to the traditional system that acquired from the traditional survey such as digitizing system because its limitations.
Background: A basic knowledge and understanding
of first aid can be invaluable for individuals to be
able to provide emergency care in the event of an
accident, possibly saving lives and minimizing
injury. Since injury is the fifth leading cause of death
and children at the age of primary school are liable
for accidents and lack of knowledge and good
judgment of their teachers may lead to dangerous
consequences when emergencies occur. Training
teachers how to deal with accidents is of obvious
importance.
Objectives: To estimate the adequacy of primary
school teachers’ knowledge of first aid concerning
external bleeding and fractures and Whether there's a
difference in knowledge in regard to yea
In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreIn order to reduce the environmental pollution associated with the conventional energy sources and to achieve the increased global energy demand, alterative and renewable sustainable energy sources need to be developed. Microbial fuel cells (MFCs) represent a bio-electrochemical innovative technology for pollution control and a simultaneous sustainable energy production from biodegradable, reduced compounds. This study mainly considers the performance of continuous up flow dual-chambers MFC
fueled with actual domestic wastewater and bio-catalyzed with anaerobic aged sludge obtained from an aged septic tank. The performance of MFCs was mainly evaluated in terms of COD reductions and electrical power output. Results revealed that the C
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreThe corrosion of low carbon steel boiler tubes in demi water had been investigated. The purpose of this investigation was to determine the change produced in corrosion behavior of the carbon steel as a result of the specific presence of chloride and copper ions in the water under different temperatures. For low carbon steel experiments, the temperature was taken in three levels (125, 175, and 215°C) under about 27 bar pressure and 1500 rpm in autoclave. Using weight loss technique, the corrosion rate ranges from (85 to 789 gmd) for low carbon steel boiler tubes.
the use of diffrent concectration of Na and Mg ions were shown to causes in increase in the bindings at oncentration