In this study, the Earth's surface was studied in Razzaza Lake for 25 years, using remote sensing methods. Images of the satellites Landsat 5 (TM) and 8 (OLI) were used to study and determine the components of the land cover. The study covered the years 1995-2021 with an interval of 5 years, as this region is uninhabited, so the change in the land cover is slow. The land cover was divided into three main classes and seven subclasses and classified using the maximum likelihood classifier with the help of training sets collected to represent the classes that made up the land cover. The changes detected in the land cover were studied by considering 1995 as a reference year. It was found that there was a significant reduction in the water mass that made up the lake and its transformation into arid land. The vegetation cover was characterized by the relative stability of the crop class. Its constant percent ranged 60% to 80%, unlike the natural plant class, which fluctuates due to its dependence on environmental factors, which is characterized by change. The Kaju presence of continuous change between soil subclasses was due to the different environments affecting the study area. The most affected class was the shallow water class, which disappeared as a result of the drought experienced by the lake.
The research aimed to evaluate the financial performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq to know the strengths and weaknesses that affect its performance, as well as to compare its performance in the years between (2017-2019), which are characterized by security stability with its performance in previous years (2014 -2016) which is characterized by security instability, to assess the extent of its ability to achieve growth in performance, by answering the main question, what is the evaluation of the performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq in the light of financial indicators?
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreLaboratory model tests were performed to investigate the behavior of shallow and inclined skirted foundations placed on sandy soil with R.D%=30 and the extent of the impact of the positive and negative eccentric-inclined loading effect on them. To achieve the experimental tests, it was used a box of (600×600) mm cross-sectional and 600mm in height and a square footing of (50*50) mm and 10 mm in thickness attached to the skirt with Ds=0.5B and various an angle of (10°, 20°, 30°). The results showed that using skirts leads to a significant improvement in load-carrying capacity and decreased settlement. In addition, when the skirt angle increased, the ultimate load improved. Load-carrying capacity decreased with increasing eccentri
... Show MoreBackground: Marginal adaptation is critical for long – term success of crown and bridge restoration. Computer aided design / computer aided manufacture (CAD/ CAM) system is gaining more importance in the fabrication of dental restoration. Objective: The aim of this study is to evaluate the effect of crystallization firing on the vertical marginal gap of IPS. emax CAD crowns which fabricated with two different CAD/CAM systems .Materials and Methods: Twenty IPS e.max CAD crowns were fabricated. We had two major groups (A, B) (10 crowns for each group) according to the CAD/CAM system being used: Group A: fabricated with Imes - Icore CAD/CAM system; Group B: fabricated with In Lab Sirona CAD/CAM system. Each group was subdivided into two s
... Show MoreThe possibility of predicting the mass transfer controlled CaCO3 scale removal rate has been investigated.
Experiments were carried out using chelating agents as a cleaning solution at different time and Reynolds’s number. The results of CaCO3 scale removal or (mass transfer rate) (as it is the controlling process) are compared with proposed model of prandtl’s and Taylor particularly based on the concept of analogy among momentum and mass transfer.
Correlation for the variation of Sherwood number ( or mass transfer rate ) with Reynolds’s number have been obtained .
Abstract
The aim of this research is to determine how well the Cubing Technique affects the Iraqi EFL students' composition writing, vocabulary, and meta-cognitive awareness of writing strategies. The sample of (64) secondary-school female students in the fifth grade is drawn from two classrooms and split into two equal groups: the experimental group and the control group, each of which consists of (32) students. A quasi-experimental design is applied. The performance test and Meta-cognitive Writing Strategies questionnaire are given as a pre-test for equalizing the two groups after ensuring their validity and reliability. Then, they are administrated as a posttest in both groups. According to the results, the si
... Show More