Water level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is important to determine these areas at different water levels to know areas which are being flooded in addition to the total area inundated .The behavior of hydrological regime of these lakes during the period was assessed using an integration of remote sensing and GIS techniques which found that the total surface area of the lakes had diminished and their water volumes reduced. The study further revealed that the levels of the lakes surfaces had lowered through these years.
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The research topic is summarized in the importance of studying the measuring the extent of the university youth’s exposure in the Emirati Society to those series and the resulting achieved satisfaction. The most important results and recommendations of the study are as follows: a high rate of the respondents’, sample individuals, exposure to the dubbed Turkish series since it is evident that almost three-fourths of the study individuals watch the dubbed Turkish series,.”. The most significant positive aspects of the dubbed Turkish series are: “they focus on the most important tourist attractions in Turkey” and “ improving the audience›s knowledge and information on the traditions of the Turkish society”. The most apparent
... Show MoreMany stone tools were found on a hill south of the Hor Al-Dalmaj which is located in the central part of the alluvial plain of Mesopotamia, between the Tigris and Euphrates Rivers. The types of rocks from which the studied stone tools were made are not found in the alluvial plain, because it consists of friable sand, silt, and clay. All existing sediments were precipitated in riverine environments such as point bar, over bank, and floodplain sediments. The collected stone tools were described with a magnifying glass (10 x) and a polarized microscope after they were thin sectioned. Microscopic analysis showed that these stone tools are made of sedimentary, volcanic igneous and metamorphic rocks, such as: sandstones, limestones, chert, con
... Show MoreThose interested in the educational process and lesson management sought to invest the information experience with industrial intelligence and technology because of its importance in increasing the effectiveness of lesson management and developing the creative capabilities of the teacher in directing and managing his lesson. Field research for sports educational institutions that are interested in managing the lesson and preparing mathematical teaching cadres is an important issue and necessary means for identifying the most important phenomena that accompany the process of managing the educational process, as the teacher's success in providing the appropriate conditions to provide rich and influencing experiences in managing and directing
... Show MoreTo finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o
... Show MorePurpose: This research seeks to provide a point of view based on the creation of sustainable value to the customer of the banks in the context of total quality management and relationship marketing. It aims to develop a model to measure the value of sustainable customer peduncular under total quality management PAL (administrative leadership, involvement of employees, continuous improvement, process improvement, staff training), through the mediation of relationship marketing and objective dimensions (administrative leadership, involvement of employees, continuous improvement, improving processes , staff training), and to explore any of the variables and dimensions more influential in the creation of sustainable value to the cust
... Show MoreThe study was conducted during the spring season of 2000 and2001. The objective was to study the changes in leaves number of sunflower plants and its leaf area during growth stages under hardening conditions to drought tolerance. Agricultural practices were made according to recommendations.Asplit-split plots design was used with three replications.The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water.The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments:Control(unsoaking), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature
... Show More