Mersing is one of the places that have the potential for wind power development in Malaysia. Researchers often suggest it as an ideal place for generating electricity from wind power. However, before a location is chosen, several factors need to be considered. By analyzing the location ahead of time, resource waste can be avoided and maximum profitability to various parties can be realized. For this study, the focus is to identify the distribution of the wind speed of Mersing and to determine the optimal average of wind speed. This study is critical because the wind speed data for any region has its distribution. It changes daily and by season. Moreover, no determination has been made regarding selecting the average wind speed used for wind studies. The wind speed data is averaged to 1, 10, 30, and 60 minutes and used to find the optimal wind speed average. This study used Kolmogorov-Smirnov and Chi-Square as the goodness of fit. The finding shows that the wind speed distribution in Mersing varies according to the time average used and the best fit distribution is Gen. Gamma. In contrast, the optimal average wind speed is 10 minutes due to the highest similarity results with 1-minute data. These affect the reliability of the finding, accuracy of the estimation and decisions made. Therefore, the implementation of this study is significant so that the wind distribution in a particular area is more accurate.
Water samples from a variety of sources in Kelantan, Malaysia (lakes, ponds, rivers, ditches, fish farms, and sewage) were screened for the presence of bacteriophages infecting
This study deals with the time property in the cinema through two films: (The Knife) directed by Khalid Hamada and (The Deceived) directed by Tawfiq Saleh. These two films were excerpted by the cinema from two novels of the Palestinian writer Ghassan Kanafani, the first is from the novel (What is Left for You) and the second is from the novel (Men in the Sun). If the Palestinian novel has imposed its presence on the Arab creative scene through a group of novelists who took it upon themselves to communicate their cause to the world, the Palestinian cinema has been far from being a purely Palestinian, because many of the cinematic works have been provided by Arab countries on the issue, while this cinema is still seeking
... Show MoreThe increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show Moresome ecological (physical and chemical varible) of water samples were studies monthly from December 2008 to May 2009 at two stations( St.1) Al - Chibayesh marsh and (St.2) Abu – Zirik marsh which are located in the south of Iraq . These variables included : Temperature, pH, EC, Dissolved oxygen , Total alkalinity, Nitrate, Sulphate, and phosphate, Si-SiO2 and Ca ,Mg, Cl, The marsh Considered as fresh water and alkaline. Abu-Zirik less than Al-Chibayesh.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreHuwaiza marsh is considered the largest marsh in the southern part of Iraq. It is located between 31° and 31.75° latitude and extends over the Iraqi-Iranian border; but the largest part lies in Iraq. It is located to the east of Tigris River in Messan and Basra governorates.
In this research, the variation of some water quality parameters at different locations of Huwaiza marsh were studied to find out its efficacy in the treatment of the contamination coming from the wastewater outfall of Kahlaa brokendown sewage treatment plant which lies on the Kahlaa River. This rive is the main feeder of Huwaiza marsh. Ten water quality sampling locations were chosen in this marsh. The water samples were taken during 2009 for three months; Janu
This is a research in which I studied the opinions of Arab scholars, in their studies
For (what) and (whatever) the two conditionals and their indication of time, and its name
B (time in (what) and (whatever) the two conditions), and I mentioned their opinions in it
This issue was discussed and discussed, and in this study it relied on the sources of the Arabic language.
Especially the books of grammar, interpretation, and the opinions of the scholars of the principles of jurisprudence are mentioned,
I also mentioned the opinion of the scholars of jurisprudence, and how they likened (whatever) to (everything).
In its indication of repetition, and as long as it indicates repetition, it indicates
time Because repetitio
The Middle Cenomanian-Early Turonian Mishrif Formation includes important carbonate reservoirs in Iraq and some other surrounding countries due to their high reservoir quality and wide geological extension. The 2D models of this study for facies, effective porosity and water saturation indicate the vertical and lateral heterogeneity of the Mishrif Formation reservoir properties in the Majnoon oil field. Construction of 2D reservoir model of the Mishrif Formation to explain the distribution of facies and petrophysical properties (effective porosity and water saturation) by using RockWorks software. The increase of effective porosity is attributed to the presence of shoal facies.The high water saturation is attributed to the existence of rest
... Show MoreThe reservoir units of Mishrif Formation in Majnoon oil field were studied by using available wireline logs (gamma ray, porosity and resistivity) and facies that derived from core and cutting samples for three wells including Mj-1, Mj-15, and Mj-20. The reservoir properties were determined and interpreted by using IP software. The results showed that unit D have the best reservoir properties due to high effective porosity, low water saturation and very low volume of shale. Furthermore, a large part of this unit was deposited in shoal environment. The other reservoir units are then graded in reservoir properties including units B, A, F & E respectively, except unit C, which is considered as a cap unit, because it consists of rest
... Show MoreThis study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh
... Show More