Al-Chibayish Marsh (CM) is considered as the major part of Central Marshes area of this marsh is 1050 Km². The water quality of these marshes is suffering from salt accumulation due to intensive dam construction, limited supply of water from sources, climate change impacts, and the absence of outlet flow from these marshes, specifically at low flow periods. So, the current research aims to assess and improve these marshes' hydraulic behavior and water quality and define the best location for outlet drains. Field measurements and laboratory tests were conducted for two periods (November 2020 and February 2021) to define the (TDS) concentrations at nine different locations. Samples were also examined for water's phy
... Show MoreThere are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
Segmented regression consists of several sections separated by different points of membership, showing the heterogeneity arising from the process of separating the segments within the research sample. This research is concerned with estimating the location of the change point between segments and estimating model parameters, and proposing a robust estimation method and compare it with some other methods that used in the segmented regression. One of the traditional methods (Muggeo method) has been used to find the maximum likelihood estimator in an iterative approach for the model and the change point as well. Moreover, a robust estimation method (IRW method) has used which depends on the use of the robust M-estimator technique in
... Show MoreAl Machraya River was considered as one of the water feeders of Hawizeh Marsh. In 1986, the outlet of this river into the marsh was blocked and the river was used as a main channel for the East Tigris Irrigation Project near Kalat Salih. This causes significant decrease in the available water supply sources, deterioration in the water quality distribution patterns and increasing the stagnation areas within the marsh. This research aims to study the possibility of reusing this river for feeding Hawizeh Marsh. A frequency analysis study was carried out to study the maximum and minimum probable water level (MMPWL) of Tigris River at the upstream of Kalat Salih Barrage. Six statistical models; Normal distribution, Log-Normal type II, Lo
... Show MoreIn this paper, the C̆ech fuzzy soft closure spaces are defined and their basic properties are studied. Closed (respectively, open) fuzzy soft sets is defined in C̆ech fuzzy-soft closure spaces. It has been shown that for each C̆ech fuzzy soft closure space there is an associated fuzzy soft topological space. In addition, the concepts of a subspace and a sum are defined in C̆ech fuzzy soft closure space. Finally, fuzzy soft continuous (respectively, open and closed) mapping between C̆ech fuzzy soft closure spaces are introduced. Mathematics Subject Classification: 54A40, 54B05, 54C05.
In this work we explain and discuss new notion of fibrewise topological spaces, calledfibrewise soft ideal topological spaces, Also, we show the notions of fibrewise closed soft ideal topological spaces, fibrewise open soft ideal topological spaces and fibrewise soft near ideal topological spaces.
The main idea of this research is to study fibrewise pairwise soft forms of the more important separation axioms of ordinary bitopology named fibrewise pairwise soft
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More