Groundwater modelling is particularly challenging in arid regions where limited water recharge is available. A fault zone will add a significant challenge to the modelling process. The Western Desert in Iraq has been chosen to implement the modelling concept and calculate the model sensitivity to the changes in aquifer hydraulic properties and calibration by researching 102 observations and irrigation wells. MODFLOW-NWT, which is a Newtonian formulation for MODFLOW-2005 approaches, have been used in this study. Further, the simulation run has been implemented using the Upstream-Weighting package (UPW) to treat the dry cells. The results show sensitivity to the change of the Kx value for the major groundwater discharge flow. Only about 7% of the models from the region can be irrigated utilizing greenhouses supported by external recharge.
Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres
... Show MoreThe corrosion behavior of Titanium in a simulated saliva solution was improved by Nanotubular Oxide via electrochemical anodizing treatment using three electrodes cell potentiostat at 37°C. The anodization treatment was achieved in a non-aqueous electrolyte with the following composition: 200mL ethylene glycol containing 0.6g NH4F and 10 ml of deionized water and using different applied directed voltage at 10°C and constant time of anodizing (15 min.). The anodized titanium layer was examined using SEM, and AFM technique.
The results showed that increasing applied voltage resulted in formation titanium oxide nanotubes with higher corrosion resistance
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
The investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreBackground: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.
... Show MorePoets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, un
... Show MoreDepp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos fro
... Show More