The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the same day. Geographical information systems (GIS) are commonly used for the process of projecting the coordination often Stations Along Al-Abbasia River in the image of the satellite (Landsat-8) to then analyze the spectral reflections of the items and then treat the data obtained after the analysis process by using (SPSS) Software to find the correlation coefficient and regression equations. Because of the high connections between water metrics and the water index, four regression models were discovered. These models can be used to predict the four water variables (EC, SO4, Cl, and NO3) at any point along the Al-Abbasia River directly from the satellite image.
Autorías: Wafaa Sabah Mohammed Al-Khafaji, Fatimah Hameed Kzar Al-Masoodi, Suadad Ibrahim Suhail Al-Kinani. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2023. Artículo de Revista en Dialnet.
Nystatin is the drug of choice for treatment of cutaneous fungal infections with main disadvantage that is the need for multiple applications to achieve complete eradication which may reduce patient compliance. Microparticles offer a solution for such issue as they are one of sustained release preparations that achieve slow release of drug over an extended period of time. The objectives of this study were to fabricate nystatin-loaded chitosan microparticles with the ultimate goal of prolonging drug release and to analyze the influence of polymer concentration on various properties of microparticles. Microparticles were prepared by chemical cross-linking method using glutaraldehyde as cross-linking agent. Five formulas, namely N1C1, N1C2,
... Show MoreThe aim of the present study is to examine the effectiveness of a proposed unite in voluntary work in enhancing critical thinking skills and the attitudes towards responsible citizenship among eighth grade female students in the Sultanate of Oman. In order to collect the study data, the researchers employed a quasi-experimental research design with twenty female students from Al-Sideeqah bint Al-Sideeq for basic education school. The research data were collected via a critical thinking test that consisted of twenty-five items and a scale of twenty items under three different dimensions, which aimed to measure students' attitudes towards responsible citizenship. The researchers implemented these two instruments as pre- and post the experi
... Show MoreThe current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More