Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS software. The regions located in Iraq, Saudi Arabia, Syria, and Jordan are the largest dust storm sources. New dust sources are identified in Iraq’s southwestern and western regions, such as Al-Nukhaib, Wadi Hauran, and Sinjar, along with new sources in Saudi Arabia, Jordan, and Syria. The most common sources are concentrated in Iraq (55.31%), mainly in the Tigris and Euphrates basin, western desert, and Al-Jazeera region, followed by Syria (19.55%), Saudi Arabia (12.29%), and Jordan (11.73%). The highest dust storm source frequency in Iraq is found in the Al- Samawa desert’s southern region (27.37%). Also, the highest frequency of dust sources from each country is determined. Knowing the origins and trajectories of dust storms will enhance treatments of these causes and their consequences on the environment and socio-economics of the region. It contributes to the support of specialised regional agencies to mitigate this phenomenon.
The study aims to study the geographical distribution of electricpower plants in Iraq, except the governorates of Kurdistan Region (Dohuk, Erbil, Sulaymaniyah) due to lack of data.
In order to reach the goal of the research was based on some mathematical equations and statistical methods to determine how the geographical distribution of these stations (gas, hydropower, steam, diesel) within the provinces and the concentration of them as well as the possibility of the classification of power plants in Iraq to facilitate understanding of distribution in a scientific manner is characterized by objectively.
The most important results of the research are that there are a number of factors that led to the irregular distribution
... Show MoreIn this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.
methodology six sigma Help to reduce defects by solving problems effectively, and works Lean to reduce losses through the flow of the manufacturing process and when integrating these two methodologies (Lean and six sigma), the methodology of Lean six sigma will form the entrance to the organizers of the optimization process and increase the quality and reduce lead times and costs . by focusing on the needs of the customer. this process uses statistical tools and techniques to analyze and improve processes.
We have conducted this research in the General Company for Electrical Industries and adopted its product (machine cooling water three taps) as a sample for research. In order to determine t
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreBackground: Laparoscopic cholecystectomy (LC) has become the standard treatment for symptomatic cholelithiasis. Bile duct injury and accidental gallbladder perforation with spillage of bile and stone are common complications of LC. This study was carried out to assess the early complications of gallbladder perforation during LC, and identify the risk factor of that perforation.
Objectives: to evaluate the early complications which may occur after the perforation of the gallbladder during laparoscopic cholecystectomy and to determine the risk factors which are associated with the perforation of the gall bladder.
Subjects and methods: A prospective comparative study o
... Show MoreBackground: Irritable bowel syndrome (IBS) is one of the most common GI disorders in people under 50 years of age.
Objective: To Formulate an overview about demographics of IBS and patterns of presentation, to determine IBS patients severity ranking, and to recognize the main regimens with their patient satisfaction.
Methods: This is a cross sectional clinical study that is conducted in Outpatient Consultant Internal Medicine Clinic in Al-Kindy Teaching Hospital from 11/12/2017 to 24/12/2017. The patients suffering from IBS are diagnosed by a consultant according to the symptom-based Rome criteria for functional GI disorders, by implementing a questionnaire collecting thorough information. 77 cases of IBS patients were collected (2
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis paper compare the accurecy of HF propagation prediction programs for HF circuits links between Iraq and different points world wide during August 2018 when solar cycle 24 (start 2009 end 2020) is at minimun activity and also find out the best communication mode used. The prediction programs like Voice of America Coverage Analysis Program (VOACAP) and ITU Recommendation RS 533 (REC533 ) had been used to generat HF circuit link parameters like Maximum Usable Frequency ( MUF) and Frequency of Transsmision (FOT) .Depending on the predicted parameters (data) , real radio contacts had been done using a radio transceiver from Icom model IC 7100 with 100W RF
... Show MoreBacteriophage of E. Coli interspecies from sewage samples were isolated , the phage particles were isolated from two different sewage samples . The first sample was collected from sewage sample of Baghdad university and the second sample was isolated from domestic sewage sample , first sample showed phages specialized for three E. Coli interspecies bacteria (first plate ) and two E. Coli interspecies bacteria (second plate ) , meanwhile second sample showed phage specialized for two E. Coli. interspeciesThe study of appearance of E coli phages from first sample showed three types of E. coli phages with different size of inhibition zone ( 1 , 0.7,0.5 )Cm respectively ( first plate ) , meanwhile E. Coli interspecies bacteria showed phages
... Show MoreBackground: Many types of instruments and techniques are used in the instrumentation of the root canal system. These instruments and techniques may extrude debris beyond the apical foramen and may cause post-instrumentation complications. The aim of this study was to evaluate the amount of apically extruded debris resulted by using 4 types of nickel-titanium instruments (WaveOne, TRUShape 3D conforming files, Hyflex CM, and One Shape files) during endodontic instrumentation. Materials and methods: Forty freshly extracted human mandibular second premolar with straight canals and a single apex were collected for this study. All teeth were cut to similar lengths. Pre-weighted glass vials were used as collecting containers. Samples were randoml
... Show More