Preferred Language
Articles
/
bsj-3186
The Al-Abiadh Valley Drainage Basin Environmental Aspects Extraction Using Quantitatively Morphometric Analyses of Shuttle Radar Topographic Mission Data
...Show More Authors

         The accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.

This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was extracting then taking up the quantitative analysis technique to estimate the basin morphometric aspects and the basin's environmental parameters that created them.

         The Al-Abiadh valley basin is a six-order one with a dendritic, parallel, and deranged drainage network. The flood hazard is absent at the basin mouth because the valley runoff takes a long time to reach the sink (Al-Razaza Lake), located in the middle part of Iraq, with a low flow peak due to the high permeability soil, the arid to semi-arid climate, and the low annual precipitation rate.

         The region studied is an alluvial basin with similar geological structural solidity in most places. The drainage network was found to be controlled by lineaments and fracture traces; the basin has passed its youth geomorphic phase.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Prediction of the Scale Removal Rate in Heat Exchanger Piping System Using the Analogies between Mass and Momentum Transfer
...Show More Authors

The possibility of predicting the mass transfer controlled CaCO3 scale removal   rate has been investigated.

Experiments were carried out using chelating agents as a cleaning solution at different time and Reynolds’s number. The results of CaCO3 scale removal or (mass transfer rate) (as it is the controlling process) are compared with proposed model of prandtl’s and Taylor particularly based on the concept of analogy among momentum and mass transfer.

Correlation for the variation of Sherwood number ( or mass transfer rate ) with Reynolds’s number have been obtained .

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End): Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End)
...Show More Authors

Abstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 27 2022
Journal Name
Al–bahith Al–a'alami
The image of the Islamic Republic of Iran in the independent Iraqi press: An analytical study of the Al—Zaman, Al-Dustour, and Al-Mada newspapers
...Show More Authors

Through this descriptive study of the image of the Islamic Republic of Iran in the independent Iraqi press, the researcher relies on surveys, content analysis, and observation tools. The research community selected was the Iraqi independent press, represented by the Al-Zaman, Al-Dustour, and Al-Mada newspapers. The researcher adopts the comprehensive inventory method for newspaper issues produced between October 2019 and January 2020.

The results of this study show that Iran's interference in Iraq's internal affairs was one of the most prominent components of the picture that independent Iraqi newspapers seek to paint about the Islamic Republic of Iran.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of The College Of Education For Women
Estimation of the Risk of Water Erosion in Jawarta District in Sulaymaniyah Governorate Using the Global Equation for Soil Loss (USLE)
...Show More Authors

The present research deals with the spatial variance analysis in Jwartadistrict and conducting a comparison on the spatial and seasonal changes of the vegetation cover between (2007-2013) in order to deduce the relationship between the vegetation density and the areas which are exposed to the risk of water erosion by using Plant Variation Index  NDVI) C (coefficient and by using Satellite images of Landsat satellite which are taken in 2/7/2007 and Satellite images of Landsat satellite taken in 11/1/ 2013, the programs of remote sensitivity and the Geographic Information Systems.

    The study reveals that there is a variance in the density of vegetation cover of the area under study betwee 2007 and 2013. Howev

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 23 2021
Journal Name
Review Of International Geographical Education Online
Idyllic Pastoral: Environmental Scenic Remedial Sublimes for Apocalyptic Ecophobia in Margaret Atwood's The Year of the Flood.
...Show More Authors

Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital employment of education data in children's television programmes
...Show More Authors

The communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 03 2018
Journal Name
University Of Plymouth
Green networking: analyses of power consumption of real and complex IFFT/FFT used in Next-Generation Networks and optical Orthogonal Frequency Division Multiplexing
...Show More Authors

he Orthogonal Frequency Division Multiplexing is a promising technology for the Next Generation Networks. This technique was selected because of the flexibility for the various parameters, high spectral efficiency, and immunity to ISI. The OFDM technique suffers from significant digital signal processing, especially inside the Inverse/ Fast Fourier Transform IFFT/FFT. This part is used to perform the orthogonality/De-orthogonality between the subcarriers which the important part of the OFDM system. Therefore, it is important to understand the parameter effects on the increase or to decrease the FPGA power consumption for the IFFT/FFT. This thesis is focusing on the FPGA power consumption of the IFFT/FFT uses in the OFDM system. This researc

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref