Water has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sources and lead to a widespread collapse of water quality. In present work, by using Data observation with the integration between remote sensing and GIS techniques to prepare maps of the distribution of concentration materials in Shatt al-Arab River south of the province of Basra in January 2015 to determine the level of pollution in the river. These include pH, dissolved oxygen (DO2), phosphates (PO4), nitrates (NO3), calcium, magnesium, potassium, Total soluble solids (TDS), electrical conductivity (EC) as well as alkaline salts (ALK.) The quality of polluted water has been observed at the sites of the study due to the increase in wastewater flowing into the river, especially river branches and the illegal discharges of industrial waste and sewage. In addition to the severe shortage of water levels in the last five years.
The research aims to identify the concept of green taxes and their role in reducing environmental pollution through the poll of Abnh of taxpayers and employees of the General Authority for taxes totaling 200 individual .autam adoption of the resolution as a tool head for the collection of data and information from the sample and analyzed their responses using a statistical program (spss - 10), and calculating the percentages and the arithmetic mean, standard deviation and research found to a number of conclusions, notably the lack of legislation with the challenges and the difficulty of the existence of a measure or a standard lack of planning for the application of environmental taxes that the state taxation application between the Gene
... Show MoreAbstract:
The purpose of this research is measuring relationship level and impact between Organizational Factors and their Dimensions (Leadership, Organizational Structure, Organizational Culture), and Talent Management Strategies (Talent Recruitment,Talent performance management, Talent Development, Talent Retention ). it was relied on the Questionnaire form as a basic instrument in collecting the Data by using (Likert) instrument ,which was distributed on the research Sample which number was (100) individual included (Managers of schools, assistants (scientific and Administration ) and teachers in Four schools of Talents in Iraq (Baghdad , AL-Nagaf , AL-Basra, Mesan). All fo
... Show MoreIntroduction & Aim: Long-term diabetes mellitus (DM) is known to have a deleterious impact on bone health, resulting in change in bone mineral density, bone turnover, and bone quality, all of which increase the risk of fractures. The aim of. this study was to link immunological and pro-inflammatory cytokine (I.L-6, I.L-1, and TNF-alpha) markers in patients.with type 1 diabetes to Their connection to bones formation (sPINP) and bone resorption parameters (sCTX). Materials & Methods: This study included 80 patients suffering from T1DM in the age range of 20-45 years. The patients were assayed for their biochemical (Vitamin D and HbA1c), Immunological (IL-6, IL-1 and TNF-alpha) parameters, as well as bone formation and resor
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators