This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration
In this study, phosphorescence analysis (KPA) is used for determining soil collected from the Tigris River from Al- Karrada and Bab Al-Sharq in Baghdad and samples were taken from rainwater collected from Al-Rashad, Al-Obeidi, Al-Dora and Al-Sadr City in Baghdad. The measurements were carried out by the Iraqi Ministry of Health and Environment, in the Radiation Protection Center. The collection, removal and evaporation of the samples ranged from January to the end of March 2018. The results show the presents of concentration of 238U and 235U in soil samples and the rainwater samples. The conclusion of this work is the concentration of uranium in soil samples is more than recommendations by ICRP value of 1.9 μg /l. While all water sample
... Show MoreIn this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4th-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.
This paper reports experimental and computational fluid dynamics (CFD) modelling studies to investigate the effect of the swirl intensity on the heat transfer characteristics of conventional and swirl impingement air jets at a constant nozzle-to-plate distance ( L = 2 D). The experiments were performed using classical twisted tape inserts in a nozzle jet with three twist ratios ( y = 2.93, 3.91, and 4.89) and Reynolds numbers that varied from 4000 to 16000. The results indicate that the radial uniformity of Nusselt number (Nu) of swirl impingement air jets (SIJ) depended on the values of the swirl intensity and the air Reynolds number. The results also revealed that the SIJ that was fitted with an insert of y = 4.89, which correspo
... Show MoreThe childhood of the important stages in which the adopted child's personality, mental and physical, motor and configure , as well as gain experience , it is the basis on which the future life of the child , studies have unanimously competent in the fields of childhood verily the first five years of a child of the most important stages of life and the most fertile life . Because the stage Childhood its an active role as the foundation upon which to build human personality , it was necessary to create all leads to raise the level of intelligence of children , because intelligence is the first element in the organization of thinking makes the child able to do the activities characterized by mental qualities .
Indicated most of the scien
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More