A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
The shortage of irrigation water requires specific measures. One of these measures is the application of the rationing system (a period of irrigation followed by a period of drought). This system could have an effect on the behavior and properties of irrigation canals. So, studying rationing system on the irrigation canals is important both in civil engineering and water resources engineering, especially if these channels constructed with gypsum soil. This study includes the calculation of seepage velocity and water content in each cycle (10 days wetting and 10 days of drying). The model is built for this research contains four samples, two samples for untreated soil one of them expos
This research aims to clarify the conceptual framework of social entrepreneurship shows the importance of the development of social entrepreneurship according to the contextual aspects and the social value achieved from these works. It also identifies the degree of level of a sample of women entrepreneurs in Iraq for the extent of the relationship between social entrepreneurship and women's empowerment. It also explains the impact of entrepreneurial work in empowering women and the extent to which there are individual differences between the average scores of the sample members’ estimation of the level of social entrepreneurship according to social status, age group, educational qualification, and specialization according to the s
... Show MoreThis research aims to find out the phonemic, dialect and semantic ailments that were interrogated by the book of the parsing of thirty surahs of the Noble Qur’an by Ibn Khalawiyeh, by examining some phonemic phenomena of Qur’anic expressions and their explanatory relationships that resulted in their occurrence, such as substitution and compression, as the sounds in a word are affected by one another, especially during performance and composition. This influence and influence is the tendency of the human being to the law of ease, facilitation, and the reduction of muscular effort in speech often, all for the purpose of obtaining phonemic harmony for the compound letters; To facilitate pronunciation; And get rid of the muscular effort
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis paper considers the maximum number of weekly cases and deaths caused by the COVID-19 pandemic in Iraq from its outbreak in February 2020 until the first of July 2022. Some probability distributions were fitted to the data. Maximum likelihood estimates were obtained and the goodness of fit tests were performed. Results revealed that the maximum weekly cases were best fitted by the Dagum distribution, which was accepted by three goodness of fit tests. The generalized Pareto distribution best fitted the maximum weekly deaths, which was also accepted by the goodness of fit tests. The statistical analysis was carried out using the Easy-Fit software and Microsoft Excel 2019.
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThe measurements and tests of the samples conducted in the laboratories of the College of Agriculture included isolating bio-fertilizers and testing the efficiency of isolates that fix atmospheric nitrogen and solubilize phosphorous compounds. Bacteria were isolated and identified from the rhizosphere soils of different plants collected from various agricultural areas. A total of 74 bacterial isolates were obtained based on the phenotypic characteristics of the developing colonies, as well as biochemical and microscopic traits. The results of isolation and identification showed that among the 74 bacterial isolates, there were 15 isolates of A. chroococcum, 13 of Az. lipoferum, 13 of B. megaterium, 10 of P. putida, 10 of Actinomycetes, and n
... Show MoreThe study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreThis research is an attempt to solve the ambiguity associated with the stratigraphic setting of the main reservoir (late Cretaceous) of Mishrif Formation in Dujaila oil field. This was achieved by studying a 3D seismic reflection post-stack data for an area of 602.62 Km2 in Maysan Governorate, southeast of Iraq. Seismic analysis of the true amplitude reflections, time maps, and 3D depositional models showed a sufficient seismic evidence that the Mishrif Formation produces oil from a stratigraphic trap of isolated reef carbonate buildups that were grown on the shelf edge of the carbonate platform, located in the area around the productive well Dujaila-1. The low-frequency attribute illustrated tha
... Show More