Al Machraya River was considered as one of the water feeders of Hawizeh Marsh. In 1986, the outlet of this river into the marsh was blocked and the river was used as a main channel for the East Tigris Irrigation Project near Kalat Salih. This causes significant decrease in the available water supply sources, deterioration in the water quality distribution patterns and increasing the stagnation areas within the marsh. This research aims to study the possibility of reusing this river for feeding Hawizeh Marsh. A frequency analysis study was carried out to study the maximum and minimum probable water level (MMPWL) of Tigris River at the upstream of Kalat Salih Barrage. Six statistical models; Normal distribution, Log-Normal type II, Lo
... Show MoreThis research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Objective: To generate a model that conceptualizes the phenomenon of health promotion and its related factors.
Methodology: A grounded theory methodology is used as qualitative method to explore the health promotion as
phenomenon of interest and its other related factors from the perspectives of specialists in this field. The study is
carried out from January 2002 through September 2004. A sample of (20) specialists in health sciences are
selected and interviewed as experts in the area of health promotion. The investigators conducted intensive and
structured interviews with the specialists to collect the data. These interviews were transcribed verbatim,
analyzed and interpreted.
Results: Findings of the study indicat
A sensitive spectrofluorimetric method for the determination of glibenclamide in its tablet formulations has been proposed. The method is based on the dissolving of glibenclamide in absolute ethanol and measuring the native fluorescence at 354 nm after excitation at 302 nm. Beers law is obeyed in the concentration of 1.4 to 10 µg.ml-1 of glibenclamide with a limit of detection (LD) of 0.067 µg.ml-1 and a standard deviation of 0.614. The range percent recoveries (N=3) is 94 - 103.
This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More