In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.
Samuel Beckett’s Happy Days (1961) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Samuel Beckett to use a lot of pauses and silences in all plays written instead of using words. To express the bewilderment of the modern man during the 20th century, Beckett adopts the use of no language strategy in the dramatic works. After World War II, people were without hope, religion, food, jobs, homes, or even countries. Beckett gave them a voice. He used a dramatic language out of everyday things, in which silence was part of the syntax as a poetic repetition. Language is no more important to the modern man; instead, he us
... Show MoreThe examination of gills of the common carp Cyprinus carpio revealed the presence of two species of the family Trichodinidae belonging to the genus Dipartiella (Raabe, 1959) Stein, 1961 namely D. indiana Saha and Bandyopadhyay, 2017 and D. kazubski Mitra and Bandyopadhyay, 2009 for the first time in Iraq from Al-Graiat location on the Tigris River at Baghdad city. This also represents the first record of the genus Dipartiella from fishes of Iraq. The descriptions and measurements of these two parasite species as well as their illustrations were given.
Abstract
The research aims to identify the logical intelligence of distinguished students and to identify the extent of the contribution of the fields of logical intelligence to the sensitivity of students' sensory processing in distinguished schools. The research sample consisted of (400) male and female students selected by the stratified random method with the proportional method. The scale that was prepared according to the theoretical framework and the adopted theory was applied after being subject to the psychometric properties of validity and reliability, Logical thinking (observation, interpretation, mathematical and arithmetic operations) contributed to sensory processing. The results showed that disting
... Show MoreI often read in Islamic jurisprudence in all chapters as much as possible from divine success, time and health, and everything I read in any of the chapters of jurisprudence, I see divine light, eternal wisdom, and a constitution that does not accept error and alteration, as I looked at the great jurisprudential treasures and this enormous wealth, A person finds in himself helplessness in front of this law, how clear, easy, and accurate it is, and it contains permanent good for man, as it is a religion of mercy, benevolence, and goodness, and among these chapters of jurisprudence is the jurisprudence of the commandment. Of the reasons, in the will, the person has had the opportunity to make up for what he missed of doing good that a pers
... Show MoreThe method of Similarity of important topics in Arabic Rhetoric has ample evidence in the Qur'an and the Hadith and the words of the Arabs and this study is limited to only the Koran.
There have been Similarity in the Holy Quran on both types : investigative and discretion , but the verses are more Similarity investigative and in verse 49 Similarity investigative and in verse 25.
The rush of Albulageyen and many other examples of Quranic Vmtheloa on Similarity , with a linguistic analysis and return to the origins of the meanings are not properly counted Similarity , Kolvaz cunning , deception , and maliciousness , the bad and ridicule.
This study seeks as much as possible to the statement of this phenomenon and stand on these t
There is an association between the signifier and the signifier. This association shows the eyeball, which acquires a direct presence and whose presence influences the level of production of the hidden connotation. Because the theatrical presentation is a series of auditory-visual functions, these signs are looking for the exploration of their meanings and their evocation to form a complete loop to achieve the association of the above. This is what made the researcher to monitor the abundance of semantic shifts in theatrical presentation as long as the implications of the strategy continue in the game of semantic production with multiple horizons, and the idea in theatrical presentation tolerates multiple readings according to the refere
... Show MoreA New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
The research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThose interested in the educational process and lesson management sought to invest the information experience with industrial intelligence and technology because of its importance in increasing the effectiveness of lesson management and developing the creative capabilities of the teacher in directing and managing his lesson. Field research for sports educational institutions that are interested in managing the lesson and preparing mathematical teaching cadres is an important issue and necessary means for identifying the most important phenomena that accompany the process of managing the educational process, as the teacher's success in providing the appropriate conditions to provide rich and influencing experiences in managing and directing
... Show More