Gray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method
An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreThe research in the linguistic structures of the historians Al-Yaqoubi is considered a model of the important topics in historical studies in general, given its importance in the lives of peoples due to its connotations and meanings that summarize interpretation, clarification, and prolonged speech, as it includes life meanings with many dimensions, these structures have been used in historical incidents Important, and throughout the different ages, as it can be used to support an opinion, solve problems, prove evidence, increase wisdom, and it needs rich life experiences, and a sound language, to use it, and needs a wide absorptive capacity for the recipient, the research included linguistic structures in the achievement of science , Lingu
... Show MorePhysical model tests were simulated non-aqueous phase liquid (NAPL) spill in two-dimensional
domain above the water table. Four laboratory experiments were carried out in the sand-filled
tank. The evolution of the plume was observed through the transparent side of this tank and the
contaminant front was traced at appropriate intervals. The materials used in these experiments
were Al-Najaf sand as a porous medium and kerosene as contaminant.
The results of the experiments showed that after kerosene spreading comes to a halt (ceased) in
the homogeneous sand, the bulk of this contaminant is contained within a pancake-shaped lens
situated on top of the capillary fringe.
This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated that th
... Show MorePoets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, un
... Show MoreShell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.
Asset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreThis paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More