The aim of the study is the assessment of changes in the land cover within Mosul City in the north of Iraq using Geographic Information Systems (GIS) and remote sensing techniques during the period (2014-2018). Satellite images of the Landsat 8 on this period have been selected to classify images in order to measure normalized difference vegetation index (NDVI) to assess land cover changes within Mosul City. The results indicated that the vegetative distribution ratio in 2014 is 4.98% of the total area under study, decreased to 4.77% in 2015 and then decreased to 4.54
This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreThe provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreThe provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreTV drama has gone through many developmental stages until it reached and settled in the form of TV series of thirty episodes. Alongside the development of the TV technologies and the widespread of satellite channels, the form of the TV drama has changed and the series has consisted of two parts and then parts multiplied until they amounted to ten parts and more. This form of TV drama has become an artistic phenomenon, that once the series is displayed on one of the channels and achieves a noticeable success, its producers work to produce a second part of that series and so on. This form of TV drama has remained away from being researched.
This has urged the researcher to accomplish this study entitled (TV series of multiple parts fro
University campuses in Iraq are substantial energy consumers, with consumption increasing significantly during periods of high temperatures, underscoring the necessity to enhance their energy performance. Energy simulation tools offer valuable insights into evaluating and improving the energy efficiency of buildings. This study focuses on simulating passive architectural design for three selected buildings at Al-Khwarizmi College of Engineering (AKCOE) to examine the effectiveness of their cooling systems. DesignBuilder software was employed, and climatic data for a year in Baghdad was collected to assess the influence of passive architectural strategies on the thermal performance of the targeted buildings. The simulations revealed that the
... Show MoreObjective(s): To evaluate primary health care services at primary health care centers in Baghdad City and to compare between these primary health care centers relative to such quality. Methodology: A descriptive design, using the evaluation approach, is study to Evaluation of quality of primary care services at primary health care centers in Baghdad City. A multistage probability sample of (36) health care centers was selected. The sample consists of (12) model centers, (12) urban centers, and (12) rural centers.A constructedquestionnaire is composed of (23) items. It consisted of (5) parts that include inta
Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More