Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only about 7% of the models from the region can be irrigated utilizing greenhouses supported by external recharge.
This paper represents an experimentalattempt to predict the influence of CO2-MAG welding variables on the shape factors of the weld joint geometry. Theinput variables were welding arc voltage, wire feeding speed and gas flow rate to investigate their effects on the shape factorsof the weld joint geometry in terms of weld joint dimensions (bead width, reinforcement height, and penetration). Design of experiment with response surface methodology technique was employed to buildmathematical models for shape factors in terms of the input welding variables. Thepredicted models were found quadratic type and statistically checked by ANOVA analysis for adequacy purpose. Also, numerical and graphical optimizations were carried out
... Show MoreDust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed
... Show MoreThe feline calicivirus (FCV) is a highly contagious and infectious virus that infects cats and causes moderate to stringent respiratory infections and oropharyngeal illness. It is prevalent in shelters and birthplace colonies and frequently infects kitten cats. 50 distinct cats were involved in the research, with samples acquired between October 2020 and January 2021. Swabs were taken from the oropharynx and conjunctiva, conditional on the signs of FCV disease septicity, to inspect viral nucleic acid from collecting samples, then extract the RNA from the swabs and turn it into a cDNA particle, and finally distinguishing the open reading frame nucleic acid gene 2 using a primer special for feline calicivirus, All specimens were taken
... Show MoreThank God also taught us that thanks . thank meets the blessings and rewards mazidk glory we have no knowledge except what you have taught you Alim hakim , not counted praise you as yourself praised and pray and to recognize the envoy mercy to the worlds , prophet Mohammed and his family and companions and guided to the day of judgment .
But after :
Aware of the interpretation of the most important science needed by Muslims because God Almighty sent down the Quraan to be a way of the life for Muslims is subject to a healing for what is in the breasts and it slaham and flaham and has spared the nation from crisisThe stats of the monks , like other verses talking about Christians and Jews and what they have invented in the religion o
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreCholelithiasis is one of the commonest surgical problems and one of the most common gastrointestinal diseases throughout the world but its pathogenesis remains unclear. Many theories have been proposed forward to explain the mechanism of stone formation. It is not fully clear if symptomatic gallstone disease is associated with a specific pattern of some biochemical abnormalities, as lipid profile and fasting blood sugar in serum of patients.
This study was designed to estimate lipid profile and fasting blood sugar in the sera of patients with cholelithiasis in comparison with normal individuals (control).
In this study, 104(male=16, female=88) were symptomatic gallstone patients (aged 42.79± 12.18 years), and 38(male=6
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More