In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. The forms were distributed to more than 90 persons who works in the chemistry department laboratories, of Ibn Al Haitham college of education, university of Baghdad. Statistical analysis is carried out using IBM Statistics SPSS, Version 24,2016. an internal consistency reliability was estimated using Cronbach’s alpha measuring scale, a value of 83.4 % was achieved it indicates a good reliability. The research emphasized a shortage in the application of safety procedures due to the lack of hardware requirements, as well as training. Control banding chemical uses in research and education laboratories, checklists and development of standard operating procedures are the most important things to achieve the safety in chemical laboratories.
This study was conducted to estimate the extent of damage to the population in Basra, southern Iraq, specifically the areas adjacent to the Shatt al-Arab and the Arabian Gulf, which are the Al-Fao district and the Al-Siba region. They are affected by the progression of saline water resulting from the lack of water imports and the Karun River interruption, which led to high concentrations of salts in the Shatt Al-Arabs. Consequently, its effect on lands and all life types in these areas requires correcting a map of the study area to drop the groundwater sites as well as calculate the total dissolved salts, electrical conductivity and pH. This study concluded that the groundwater contains very high percentages of total dissolved solid
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show MoreOne of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe fluctuation properties of energy spectrum, electromagnetic transition intensities and electromagnetic moments in nucleus are investigated with realistic shell model calculations. We find that the spectral fluctuations of are consistent with the Gaussian orthogonal ensemble of random matrices. Besides, we observe a transition from an order to chaos when the excitation energy is increased and a clear quantum signature of the breaking of chaoticity when the single-particle energies are increased. The distributions of the transition intensities and of the electromagnetic moments are well described by a Porter-Thomas distribution. The statistics of electromagnetic transition intensities clearly deviate from a Porter-Thomas distribution (i
... Show More1. Building an analysis tool that determines the strength of a relationship in a psychological experiment. 2. To identify the degree of direction of the research sample on the lab psychological variable according to gender (males - females). 3. Recognize that there are no statistically significant differences about the psychological laboratory variable according to gender (males - females). To investigate the goals of the current research, seek to develop a tool to measure attitudes towards laboratory psychological variables that are scaled according to a range of 24 items including paragraphs ranging from positive to negative attitudes that gradually change from significantly agree, moderately agree, slightly agree, not agree, and I do
... Show MoreDBN Dr. Liqaa Habeb, International Journal of Multidisciplinary Reseach, 2015
This study was conducted to test the hypothesis that the duration of time spent by the student inside the examination rooms answering the all kinds of written ex-amination questions has some kind of a positive effect on the final score he will get from that exam. And if there arc gender differences in this respect. Students and methods: Data on the final examinations of the autumn quarter was gathered on 892 examina-tions conducted at the end of this quarter , this included male participants of 566 and females of 326. Examinations were on twenty different subjects , including all of the first five years of the undergraduate students of Iraqi College of Medicine for the academic year 2002 — 2003 . The scheduled time of the examinations was
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More