Evaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed to evaluate effect of each of these variables on estimation process. Two error statistics namely root mean squared error and coefficient of determination were used to measure the performance of the developed models. The results indicated that the model, whose input variables are T, W, and RH, perform the best for estimating evaporation values. In addition, the model which is dominated by (T) is significantly and distinctly helps to prove the predictive ability of fuzzy inference system. Furthermore, agreements of the results with the observed measurements indicate that fuzzy logic is adequate intelligent approach for modeling the dynamic of evaporation process.
This study includedepidermal appendages characters of ten species belongingto the familyAsteraceae.Most of the studied species are characterized by eglandular, glandular, trichomesand papillae which are variable according to itskind, number of cells, shape, dimensions, characteristicsof surrounding cells, wall thickness and the position. Results showed that all species included glandular and eglandulartrichomes exceptCosmos bipinnatus, Ecliptaprostrate, andEupatoriumcannabinum that lacked in glandular trichomes and were based on their specific details.Trichomes were divided into different groups. The glandular ones involved sessile glandular or group multicellular and the head wasmace-shaped or round
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreLate Paleocene –Early Eocene algae and benthic foraminifera were identified
from the Sinjar Formation that crop out in three selected section from northern
Iraq. The selected sections: (Derbandikhan ,Qara dagh, Wara Mali has been
measured in the field and closely sampled to undertake details. A number of (131)
samples were collected illustrating all the lithological changes along the sections,
The limestone in the studied section is rich in algae and large benthic foraminifera,
The investigation of the thin sections allowed us to identify the (47 ) species of
foraminifera and (34) species of algae , Five biozones were distinguished for algae
which are :a- Amphiroa iraquensis range zone ,b- Trinocladus perplexus
The study included the determination of pollen grains features for 8 genera and 13 taxa of Mimosoideae subfamily grown in Baghdad/ Iraq by using each of light and scanning electron microscope. The samples of taxa were collected from various sites in Baghdad province in central Iraq located on 32 45° 0-33 45 0 N and 44 0 0- 44° 45 0 E. the results from this study revealed different pollen types as monad in each of Leucaena, Prosopis, and Neltuma, tetrad in Mimosa and polyads in Acacia, Albizia, Calliandra, Pithecellobium and Vachellia. Each taxa of these genera characterized by special palynological features as shape, size, number of polyads grain and conplateuration as well as other parameters included other dimensions, and these
... Show MoreA fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT
This study aims to assess the suitability of the sediments present in Tigris River, Tikrit city, northern Iraq for concrete production and road building purposes. Representative samples were collected from three selected stations at the study area using the channel modeling method. According to the grain size analysis, the sediments were classified as a type of poorly graded gravels (GP) depending on the unified soil classification system. The true specific gravity of the soil ranged between 2.28 and 2.568. The chemical analysis of the study samples revealed that gypsum content ranged between 0.82 and 1.69 %. Total soluble salts ranged 2.45- 3.87%, the organic matter content ranged 0.14- 0.76%, and the pH value was between 7.73 and 7.38%
... Show MoreThe parasite tapeworm (Raillietina echinobothrida) belonges to the class Cestoda, it is responsible for nodular tapeworm disease in poultry .The aim of this study was to determine tapeworm parasites infections in Columba livia from two markets in the province of Baghdad for the period from May to December 2014. From a total of thirty five sample of Columba livia were randomly selected and then examined the elementary canal of these samples. The present study showed that the collected rock pigeon were found six infected with the cestode Raillietina echinobothrida with infection rate (17.14%). The statistical analysis for the characters of the cestode showed significant differences in all recipes, but there were no significant difference
... Show More