This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on bands 10 (Thermal Infrared 1) and 11 (Thermal Infrared 2) that are sensitive to thermal radiation, as the highest surface temperature reached in June 45.49°C degrees Celsius due to the high temperatures for this month and the lowest in February 3.09°C degrees Celsius, which is one of the months in which temperatures drop to the lowest level. The utilization of remote sensing and GIS innovations has helped a lot in checking changes, whether in surface area or temperature, which saves effort, time and cost. The results of this study put decision makers in taking the necessary precautions for the seasons of water scarcity and drought to meet the community’s water needs in the areas of multiple human consumptions and at the same time take advantage of rainy seasons and water abundance to develop long-term strategic plans to maintain a sustainable water balance.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe aim of this study to investigate the microbial load and type of preservative for the types of yogurt available in the Iraqi market to ensure the safety of food provided to the consumer and protect through examining the types of yogurt from harmful bacteria as well as to contain ratios acceptable to yeasts and molds is to find out by comparing models curd careless Iraqi standard quality(ISQ) and see how they conform to these specifications have been collecting 12 brands of yoghurt types it was been (Kala, Activia 1, Activia 2, Mazia, Shelan, Aib, Mersin, Morsi, Al-Safi, Zabady, Zakho, Arbil). Bacteriological tests were conducted on samples of yogurt (total bacterial count, coliform count, counting yeasts and molds). The results showed
... Show MoreThe objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3
... Show MoreDue to the importance of the relationship between the phenomenon of inflation and the exchange rate in the formulation of monetary policy in Iraq, the exchange rate plays a strategic role in limiting the inflation caused by the monetary expansion due to government spending, as a point of a view, the inefficiency of interest to achieve the monetary market balance and stability of the general level of prices as an overall goal of monetary policy in Iraq, the exchange rate has emerged as a brake on inflation in Iraq, as the research found that the monetary authority in the period 2003-2018 provided a methodical development in the formulation of monetary policy towards realizing the effects of inf
... Show More