Air pollution is very important topic for those interested in studying the environment because of its importance and the damage caused by it to human, animal and plant life. This research addresses the concept of air pollution, its causes, and its danger, and sheds light on the influence of climate elements on environmental pollution and the effect of temperature, rain, humidity, wind direction and speed, and atmospheric pressure on the increase or decrease of air pollution. This research discusses the sources of air pollution, including natural ones, including dust, smoke resulting from fires, erupting volcanoes, and others, including those resulting from human uses such as the use of fuel and others. The research addressed the dam
... Show MoreThe artistic signature of calligraphers has been regarded as a significant aspect of Arabic calligraphy since its inception. As the art form evolved and acquired an aesthetic dimension, the artistic signature became an integral part of this dimension. The calligrapher failed to include his name on the frames, a practice that has become customary among calligraphers nowadays. This tradition allowed to trace the evolution of Arabic calligraphy and identify certain gaps in the calligraphy composition. Additionally, the inclusion of calligrapher's name contributes to the achievement of visual balance within the calligraphy composition, signifying consistency or formal separation. The current study concentrated to investigate the aesthet
... Show MoreElectrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreThe tourism industry has become, currently, an art, an industry and a science. It is also one of the components that make up touristic regions. Tourist attractions are no longer the exclusive visits of museums and archeological sites, but also involve other service facilities. It is, therefore, imperative that the authorities should become aware of the degradation of tourist resorts and prevent them from getting worse. Moreover, the authorities should take a set of decisions concerning the protection of the urban aspect with its historical, social, and environmental dimensions, as well as, adapting it to the modern requirements that can bring comfort to the citizens and tourists at physical and psychological levels.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe performance evaluation process requires a set of criteria and for the purpose of measuring the level of performance achieved by the Unit and the actual level of development of its activities, and in view of the changes and of rapid and continuous variables surrounding the Performance is a reflection of the unit's ability to achieve its objectives, as these units are designed to achieve the objectives of exploiting a range of economic resources available to it, and the performance evaluation process is a form of censorship, focusing on the analysis of the results obtained from the achievement All its activities with a view to determining the extent to which the Unit has achieved its objectives using the resources available to it and h
... Show More