The present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were compared for each location with the observed daily MUF values. In general, the findings show that the three investigated models gave good outcomes compared to the observed values for all selected stations. The comparative investigation results of the three tested models corresponding to the observed MUF values during the storm event revealed that the IRI -2020 Model indicate a clear impact of the geomagnetic storm on the predicted MUF values during the day of event. Similarly, for ASAPS Model, the storm's impact is clear on both the day of the event and the subsequent day, in contrast, the VOACAP model showed almost no impact of the geomagnetic storm on the observed MUF values throughout the entire study period for event 17 March 2015.
The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t
... Show MoreIn this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .
Background: Anaemia is a major public health concern and is one of the most prevalent health issue in women within reproductive age group.
Objective: to assess maternal knowledge related to anaemia during pregnancy.
Type of the study: A cross –sectional study.
Method: The study including 200 mothers who attended selected primary health care centres, Baghdad during November and December 2015, they completed a previously prepared questionnaire coveringsocio-demographic characteristics and knowledge regarding anaemia in 4 main domains. The responses were analysed by using frequency, percentage and percent score for each statement a
... Show MoreThat the nature of an important role in children's lives, Including offer them fun and freedom of thinking and capacity in the imagination. And its effective role of poets in general and especially apoet of childhood Selecting from diverse elements, And the rise to the level of human nature In order to enrich the child's imagination And the delivery of various ideas and information in a surprising. And are far from the decision-making and direct screed.this importance we set off For the study of poetic texts for children in Iraq During the research stage. Those texts in which the humanization began clearly,and our offer to these texts in style of detail and precision Not without expressing an my opinion during the research We finished th
... Show MoreIn this paper, we investigate the behavior of the bayes estimators, for the scale parameter of the Gompertz distribution under two different loss functions such as, the squared error loss function, the exponential loss function (proposed), based different double prior distributions represented as erlang with inverse levy prior, erlang with non-informative prior, inverse levy with non-informative prior and erlang with chi-square prior.
The simulation method was fulfilled to obtain the results, including the estimated values and the mean square error (MSE) for the scale parameter of the Gompertz distribution, for different cases for the scale parameter of the Gompertz distr
... Show More‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural his
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More