In this study, the Earth's surface was studied in Razzaza Lake for 25 years, using remote sensing methods. Images of the satellites Landsat 5 (TM) and 8 (OLI) were used to study and determine the components of the land cover. The study covered the years 1995-2021 with an interval of 5 years, as this region is uninhabited, so the change in the land cover is slow. The land cover was divided into three main classes and seven subclasses and classified using the maximum likelihood classifier with the help of training sets collected to represent the classes that made up the land cover. The changes detected in the land cover were studied by considering 1995 as a reference year. It was found that there was a significant reduction in the water mass that made up the lake and its transformation into arid land. The vegetation cover was characterized by the relative stability of the crop class. Its constant percent ranged 60% to 80%, unlike the natural plant class, which fluctuates due to its dependence on environmental factors, which is characterized by change. The Kaju presence of continuous change between soil subclasses was due to the different environments affecting the study area. The most affected class was the shallow water class, which disappeared as a result of the drought experienced by the lake.
The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company
... Show MoreThis study examined the imperative construction: the command, the interrogative, the prohibition, the call, and the wish. In the Diwan of Al-Shamakh bin Dirar; where the poetic verses were monitored in each of the topics of the student's creation, and the rhetorical meanings that he came out with. What is new in this study is that it is the first to study the demanded composition in the poetry of a glorious poet, Al-Shammakh bin Dirar Al-Dhubyani. As his poetry did not receive such a study, it sought to employ what was written by rhetoric scholars, in an attempt to explore the demanded composition in the poetry of Al-Shamakh. The study adopted the descriptive analytical approach, which is based on counting the number of times the poet us
... Show MoreBackground: Suppression of quorum sensing (QS) that regulates many virulence factors, including antimicrobial resistance, in bacteria may subject the pathogenic microbes to the harmful consequences of the antibiotics, increasing their susceptibility to such drugs. Aim: The current study aimed to make an aqueous crude extract from the soil Proteus mirabilis isolate with the use of the gas chromatography-mass spectrometry (GC-MS) technique for its analysis, and then, study the impact of the extract on clinical isolates of Pseudomonas aeruginosa. Methods: Preparation of crude extracts from P. mirabilis (both organic and aqueous), which were then analyzed by GC-MS to detect the bioactive ingredients. Furthermore, the extract’s capability to i
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Prosthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreWe studied the effect of certain environmental conditions for removing heavy metal elements from contaminated aqueous solutions (Cd, Cu, Pb, Fe, Zn, Ni, Cr) using the bacterium Bacillus subtilis to appoint the optimal conditions for removal ,The best optimum temperature range for two isolate was 30-35○C while the hydrogen number for the maximum mineral removal range was 6-7. The best primary mineral removal was 100 mg/L, while the maximum removal for all minerals was obtained after 6 hrs of Cu element time and the maximum removal efficiency was obtained after 24 hrs of Cu element. The results have proved that the best aeration for maximum removal was obtained at rotation speed of 150 rpm/minute. Inoculums of 5ml/100ml which contained 1
... Show Morethin films of se:2.5% as were deposited on a glass substates by thermal coevaporation techniqi=ue under high vacuum at different thikness
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreWe have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD) to estimate the parameters an
... Show More
We have presented the distribution of the exponentiated expanded power function (EEPF) with four parameters, where this distribution was created by the exponentiated expanded method created by the scientist Gupta to expand the exponential distribution by adding a new shape parameter to the cumulative function of the distribution, resulting in a new distribution, and this method is characterized by obtaining a distribution that belongs for the exponential family. We also obtained a function of survival rate and failure rate for this distribution, where some mathematical properties were derived, then we used the method of maximum likelihood (ML) and method least squares developed (LSD)
... Show More