In this study, the Earth's surface was studied in Razzaza Lake for 25 years, using remote sensing methods. Images of the satellites Landsat 5 (TM) and 8 (OLI) were used to study and determine the components of the land cover. The study covered the years 1995-2021 with an interval of 5 years, as this region is uninhabited, so the change in the land cover is slow. The land cover was divided into three main classes and seven subclasses and classified using the maximum likelihood classifier with the help of training sets collected to represent the classes that made up the land cover. The changes detected in the land cover were studied by considering 1995 as a reference year. It was found that there was a significant reduction in the water mass that made up the lake and its transformation into arid land. The vegetation cover was characterized by the relative stability of the crop class. Its constant percent ranged 60% to 80%, unlike the natural plant class, which fluctuates due to its dependence on environmental factors, which is characterized by change. The Kaju presence of continuous change between soil subclasses was due to the different environments affecting the study area. The most affected class was the shallow water class, which disappeared as a result of the drought experienced by the lake.
The Iranian nuclear program was one of the most prominent issues in the international arena, in light of Iran's insistence on using it in various ways, and according to international changes, it came under pressure from the American side to impose packages of sanctions, which continued to our time, as it went to Russia and China to gain support in developing its nuclear activities. And, by virtue of the common interests that are linked between them, Iran has received great support from the last two countries in all fields to reach the final agreement in 2015, regarding asserting the peace of these activities, in addition to lifting all restrictions represented in the previous sanctions according to the Security Council resolutions, Aldo
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreInternational satellite channels in Arabic are targeted to the region with their news bulletins and their innovative programs, attracting the interest of the Arab viewers in their news articles and programs with new ideas and methods as well as high technology in the production and synthesis of videos. Therefore, they work on framing the above, And the media policy that governs, so focused the problem of the study to try to answer the question of the President is how to frame the international satellite channels in Arabic to the phenomenon of terrorism? What are the aspects that are working to highlight and aspects that try to hide? The study adopted the survey methodology for the main news bulletins in the Russian channel today for the
... Show MoreBackground: To evaluate the bony supports of the teeth adjacent to the area of cleft in patient with unilateral cleft lip and palate and to compare these measurements with the measurements of the same teeth in non-cleft side by using CBCT. Materials and methods: The CBCT scans of 30 patients having cleft lip( unilateral) and palate(unilateral), were analyzed and the measurements of the alveolar bony support for teeth that are adjacent to the cleft area were measured with those teeth located on opposite side (non- clef) side. For each tooth, the measurements will taken for the distance between the( cementoenamel junction) (CEJ) and the bony crest (AC) at the( buccal area) was measured and the thickness of the buccal plate At zero, one, tw
... Show MoreHuman interaction technology based on motion capture (MoCap) systems is a vital tool for human kinematics analysis, with applications in clinical settings, animations, and video games. We introduce a new method for analyzing and estimating dorsal spine movement using a MoCap system. The captured data by the MoCap system are processed and analyzed to estimate the motion kinematics of three primary regions; the shoulders, spine, and hips. This work contributes a non-invasive and anatomically guided framework that enables region-specific analysis of spinal motion which could be used as a clinical alternative to invasive measurement techniques. The hierarchy of our model consists of five main levels; motion capture system settings, marker data
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More