The Atmospheric Infrared Sounder (AIRS) on EOS/Aqua satellite provides diverse measurements of Methane (CH4) distribution at different pressure levels in the Earth's atmosphere. The focus of this research is to analyze the vertical variations of (CH4) volume mixing ratio (VMR) time-series data at four Standard pressure levels SPL (925, 850, 600, and 300 hPa) in the troposphere above six cities in Iraq from January 2003 to September 2016. The analysis results of monthly average CH4VMR time-series data show a significant increase between 2003 and 2016, especially from 2009 to 2016; the minimum values of CH4 were in 2003 while the maximum values were in 2016. The vertical distribution of CH4 was relatively high in the cities located in the north of Iraq (Sulaymaniyah and Mosul) more than other cities, especially these in western Iraq (Rutba and Najaf). The highest monthly mean of CH4VMR and standard deviation (SD) was in Sulaymaniyah (1871.11±21.92) ppbv at 925 hPa, while the lowest was in Rutba (1812.81±37.3) ppbv at 300 hPa. Mosul has the second-highest mean and SD next to Sulaymaniyah, especially at the lower levels SPL (925 and 850 hPa) of troposphere more than the rest of selected cities. The seasonal variation of monthly CH4VMR, averaged from 2003 to 2016, shows high values between January and August with a peak between August and September and it declines significantly between October and December with a slight increase in November. Long term trend analysis of monthly CH4VMR at each SPL (925, 850, 600, and 300) hPa above the six cities shows positive values with average growth rates for each SPL equal to (2.9 %, 3.1%, 3.6 %, and 3.9%), respectively. These results indicate that satellite measurements were effective in determining the magnitude of increased CH4 over Iraq that may contribute to the global increase of CH4 in the earth’s Atmosphere.
In this paper, a simulation of the electrical performance for Pentacene-based top-contact bottom-gate (TCBG) Organic Field-Effect Transistors (OFET) model with Polymethyl methacrylate (PMMA) and silicon nitride (Si3N4) as gate dielectrics was studied. The effects of gate dielectrics thickness on the device performance were investigated. The thickness of the two gate dielectric materials was in the range of 100-200nm to maintain a large current density and stable performance. MATLAB simulation demonstrated for model simulation results in terms of output and transfer characteristics for drain current and the transconductance. The layer thickness of 200nm may result in gate leakage current points to the requirement of optimizing the t
... Show MoreA collection of 118 specimens of Iraqi phasianid birds belong to four species was examined
for haematozoa. Results show that 21.2% of them were infected with one or more of four
species of blood parasites; Haemoproteus danilewskyi, H. santosdiasi, Plasmodium sp. and
microfilaria. Haemoproteus danilewskyi is reported here for the first time in Iraq.
A revision study of the Sphecidae from Iraq is presented. A survey is conducted to collect the specimens from different regions; generally, there were 41 species belonging to 12 genera and 4 subfamilies are revised with synonyms.
The current investigation included the species previously reported in Iraq, which were not collected during the current investigations; the distribution and other information are also provided.
A total of 722 algal taxa are recorded in Diyala River by different authors. Most of the identification algae belong to three Divisions: Bacillariophyceae (367, 50.8%), Chlorophyceae (179, 24.8%), and Cyanophyceae (126, 17.5%).
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More