irrigation use at many stations along the Euphrates River inside the Iraqi lands and to try to correlate the results with the satellite image analyses for the purpose of making a colored model for the Euphrates that can be used to predict the quality classifications of the river for irrigation use at any point along the river. The Bhargava method was used to calculate the water quality index for irrigation use at sixteen stations along the river from its entrance to the Iraqi land at Al-Qaim in Anbar governorate to its union with the Tigris River at Qurna in Basrah governorate. Coordinates of the sixteen stations of the Euphrates River were projected at the mosaic of Iraq satellite image which was taken from LANDSAT satellite for bands 1, 2 and 3. It was noticed that there was a strong negative correlation between the water quality index and the digital numbers at band 2 for the mosaic satellite image. A regression model was built between the water quality index at December, 2009 and the digital number at band 2 so as to build a colored model which was used to predict a water quality classification for irrigation use at any point along the river.
The tongue is one of the important organs of vertebrates, as it plays an important role in the process of food intake, absorption and swallowing, It varies the morphological according to the organism, the habitat, and the nature of the food for it. The aim of the study is to reveal the histologist structure of the tongue of the guinea pig(Cavia porcellus), where we took three samples of adult males, and crosses the tongue similar to rodents, except for some differences in terms of the epithelial layers, mucosa, the muscular layer, the number of tongue layers and the spread of papillae on the tongue, which is, differences due to adaptation to the habitat and their diet.
Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation
... Show MoreResearch summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreThe research problem has crystallized and in light of these capabilities, the level of performance depends on the application of modern training methods based on actual experimentation, and those methods aim to develop the components of achievement in this competition, including the quantities of exerting the distinctive strength with speed for the arms and feet, which reflects on good skillful performance because the skill of shooting by jumping forward and high forms A major role in achieving goals during the competition that qualifies the team to win, and through the follow-up of the researcher in the field and academic field, I noticed that there is a weakness in some physical abilities, which affects performance and skill level
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless steel
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn this investigation , borax (B) (additive I) and chlorinated paraffin (CP.) (additive II) ,were used as flame retardants for each of epoxy and unsaturated polyester resins in the weight ratios of 2,4,6, & 8% by preparing films of (130×130×3) mm dimensions. Also films of these resins with a mixture of [50%(B.)+50%(CP.)] (additive III) in the same weight ratios were prepared in order to study the synergistic effect of these additives on the flammability of the two resins . Three standard test methods were used to measure the flame retardation which are : 1-ASTM : D-2863 2-ASTM : D-635 3-ASTM : D-3014
... Show More