The Atmospheric Infrared Sounder (AIRS) on EOS/Aqua satellite provides diverse measurements of Methane (CH4) distribution at different pressure levels in the Earth's atmosphere. The focus of this research is to analyze the vertical variations of (CH4) volume mixing ratio (VMR) time-series data at four Standard pressure levels SPL (925, 850, 600, and 300 hPa) in the troposphere above six cities in Iraq from January 2003 to September 2016. The analysis results of monthly average CH4VMR time-series data show a significant increase between 2003 and 2016, especially from 2009 to 2016; the minimum values of CH4 were in 2003 while the maximum values were in 2016. The vertical distribution of CH4 was relatively high in the cities located in the north of Iraq (Sulaymaniyah and Mosul) more than other cities, especially these in western Iraq (Rutba and Najaf). The highest monthly mean of CH4VMR and standard deviation (SD) was in Sulaymaniyah (1871.11±21.92) ppbv at 925 hPa, while the lowest was in Rutba (1812.81±37.3) ppbv at 300 hPa. Mosul has the second-highest mean and SD next to Sulaymaniyah, especially at the lower levels SPL (925 and 850 hPa) of troposphere more than the rest of selected cities. The seasonal variation of monthly CH4VMR, averaged from 2003 to 2016, shows high values between January and August with a peak between August and September and it declines significantly between October and December with a slight increase in November. Long term trend analysis of monthly CH4VMR at each SPL (925, 850, 600, and 300) hPa above the six cities shows positive values with average growth rates for each SPL equal to (2.9 %, 3.1%, 3.6 %, and 3.9%), respectively. These results indicate that satellite measurements were effective in determining the magnitude of increased CH4 over Iraq that may contribute to the global increase of CH4 in the earth’s Atmosphere.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe South Baghdad electrical station located on the eastern bank of the Tigris River south of Baghdad city was selected within the municipality of Karrada between two latitude ( 330 15 , 33 0 18 )North and longitude ( 44 0 27 , 44 030 ) East . The purpose of the study is to determine the contribution of the station to the effect of pollution of the Tigris water by taking water samples at the station site and two sites, one before and the other after the station, distributed over time periods of three months between each sample of water and the beginning of August and November Shabat and Mayar and analyzed water samples physically, chemically and biologic
... Show MoreThis research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreA legal discourse in the Qur’an and Sunnah is almost devoid of the use of one of the general formulas, and due to its frequent rotation in the tongue of the legislator, the formulas may overlap their members in apparently contradictory provisions, which makes the individual from the general members appear to the beholder to be covered by two contradictory provisions, and this research came to present what might happen to him The legal text interpreter of weighting between the two opposing texts is the strength of the generality that is established by the generality formula, so the two strongest formulas in the inclusion of its members outweigh the weaker of them and precede them, and the research decided that the formulas vary
... Show More