In this work various correlation methods were employed to investigate the annual cross-correlation patterns among three different ionospheric parameters: Optimum Working Frequency (OWF), Highest Probable Frequency (HPF), and Best Usable Frequency (BUF). The annual predicted dataset for these parameters were generated using VOCAP and ASASPS models based on the monthly Sunspot Numbers (SSN) during two years of solar cycle 24, minimum 2009 and maximum 2014. The investigation was conducted for Thirty-two different transmitter/receiver stations distributed over Middle East. The locations were selected based on the geodesic parameters which were calculated for different path lengths (500, 1000, 1500, and 2000) km and bearings (N, NE, E, SE, S, SW, W, NW) using a Matlab program that was designed and implemented for this purpose. Depending on the investigation results of the cross-correlation, a third order polynomial equation provides a better representation of the correlation between the tested parameters. Also, the annual values of the HPF, OWF, and BUF parameters were predicted using the proposed mathematical correlation equations. These equations were confirmed by comparing their results with the observed datasets for the studied years. Several statistical methods were used to validate the presented data, all of which gave good results for all tested cases. Also, contour plot diagrams were used to visually illustrate the annual average distribution pattern of the tested ionospheric parameters for all geodetic factors for the minimum and maximum years of Solar Cycle 24.
It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.
The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.
I chose the subject of my research the types of Mahjail and
... Show MoreObiovisly that the holy thresholds are directly related to Islam and Muslims and related to the general culture of the Islamic peoples. In terms of architecture, it is considered a distinctive architectural scene that reviews the history of this origin and its architectural styles. Recently, with the increase in the number of pilgrims and visitors to the holy shrines, there is a need to develop and expand the buildings and provide them with services and introduce modern technology. The building of the holy thresholds consists of a number of functional design indicators: The general problem of research is that there is no clear theoretical framework for the design indicators for the development of the holy shrines according to the functio
... Show MoreIschemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe interplay of predation, competition between species and harvesting is one of the most critical aspects of the environment. This paper involves exploring the dynamics of four species' interactions. The system includes two competitive prey and two predators; the first prey is preyed on by the first predator, with the former representing an additional food source for the latter. While the second prey is not exposed to predation but rather is exposed to the harvest. The existence of possible equilibria is found. Conditions of local and global stability for the equilibria are derived. To corroborate our findings, we constructed time series to illustrate the existence and the stability of equilibria numerically by varying the different values
... Show MoreSamples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power
The study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show Moreيتعرض قانون الموازنة العامة الاتحادية للطعن بعدم الدستورية كغيره من القوانين، بل أن الطعن فيه يكاد يكون سنوياً حال نشره في الجريدة الرسمية ، وتوجه إليه المطاعن بعدم الدستورية إما عن إجراءات تشريعه أو لمضامينه المتعارضة مع الدستور نصاً أو روحاً ، ولكنّه إذا كانت مدة الطعن بعدم دستورية القوانين كافة متاحة دون قيد زمني محدد ولا تتطلب سوى إجراءات إقامة الدعوى العامة وأخصها قيام شرط المصلحة في حالة الدعوى ال
... Show MoreThe present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves
... Show More