Shatt Al-Hilla branches from the left of Euphrates River, U/S Hindiyah Barrage, Iraq, and extends about 100 km. It branches at the end into Shatt Al-Diwaniya 112 km and Shatt Al-Daghara 64 km. The study aims to evaluate and develop (Hilla-Daghara) rivers system, which is included Shatt Al-Hilla and Shatt Al-Daghara. Fieldwork began from (26 October until December) 2020. M9, S5 devices, and the installed staff gauges were used to measure discharges and water levels, respectively. A one-dimensional model was developed for the study area by HEC-RAS, after calibration and verification by field measurements; the Manning's n of Shatt Al-Daghara is found to be 0.022. Five Scenarios were simulated to study the reach under the current conditions. It was found that the discharge capacity in Shatt Al-Hilla and Shatt Al-Daghara is 200 m3/s and 50 m3/s, respectively. Four scenarios were conducted for the development to improve the capacity of Shatt Al-Hilla to 303 m3/s and Shatt Al-Daghara to 75 m3/s. Earthworks volume of development Shatt Al-Hilla and Shatt Al-Daghara are about (5.89 and 0.54) Mm³, and its cost is (11.780 and 1.080) billion IQD respectively. Results of applied development show that Shatt Al-Daghara tail can pass discharge more than five m3/s when Shatt Al-Daghara tail cross regulator that causes choking in the last reach of Shatt Al-Daghara is removed.
This study tries to clear the correlation and association between asthma, obesity and leptin levels. Also it will work to indicate the main risk factors which play role in the elevation of leptin level within asthmatic patients. This is a case control study conducted on (38) asthmatic patients and (20) healthy control who were closely similar by age, gender and BMI. The main statistical tests used were student t test, linear regression test and correlation test. Significance was set at P < 0.05. Sampling method used for this study was convenience sampling method. The main results of this study show a significant association and positive correlation between age (old age ≥ 40 ye
... Show MoreImpact Resistance training with and against the trajectory of the motor in some physical abilities and the BioA 100-meter, mechanical racing run for young people. That Training Jogging for different distances Melt -Rubber ropes According to direction and reversed movement With Obligations To the border of scientific of components Pregnancy Training represents to a training trend Aimed To Events Developments In The link between Starting and running, According to the specific mechanical requirements Have It Of Development of force Explosive and quick and their components which To give Border To the level Special speed for Stages Sprint run 100 m and amounts Efforts Required instantaneous powers. Noted Researcher In That Over there Repeat For
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: The healing period for bone–implant contact takes 3–6 months or even longer. Application of Escherichia coli-derived recombinant human bone morphogenetic protein-2 (ErhBMP-2) to implant surfaces has been of great interest on osseointegration due to its osteoinductive potential. The objective of this study was to evaluate the effect of ErhBMP-2 on implant stability. Materials and methods: A total of 48 dental implants were inserted in 15 patients. Twenty four implants coated with 0.5 mg/ml ErhBMP-2 (study group). The other 24 implants were uncoated (control group). Each patient was received at least two dental implants at the same session. Both groups were followed with repeated implant stability measurements by me
... Show MoreAs material flow cost accounting technology focuses on the most efficient use of resources like energy and materials while minimizing negative environmental effects, the research aims to show how this technology can be applied to promote green productivity and its reflection in attaining sustainable development. In addition to studying sustainability, which helps to reduce environmental impacts and increase green productivity, the research aims to demonstrate the knowledge bases for accounting for the costs of material flow and green productivity. It also studies the technology of accounting for the costs of material flow in achieving sustainable development and the role of green productivity in achieving sustainable development. According
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show More