This study covers the area bounded by latitudes 29° to 34° N and longitudes 39° to 48°E.The seismicity of area for the period 1980–2011 is evaluated. In this study the geological and topography were performed, regarding the historical seismicity. More than (145) events were re-analyzed in Iraqi Seismological Network (ISN) and the recorded data was subjected to statistical analysis. This study shows high activity in the east and very low activity in the west.
Nowadays, a strong relationship between the agriculture sectors and digital technologies is really interesting. The article describes how recent intelligent technologies can improve agricultural fields. Mobile applications are software programs created on smartphones, tablets, and computers. Agricultural fields mainly represent the pillar of the economy and the business sector that fulfills the world's food requirements. The United States has a valuable rank in potato production, which depends on this production economically.
Nevertheless, so many insects affect potato yield production quantitatively and qualitatively. So, a smartphone App was created to help potato growers diagnose insects that directly attack potato cro
... Show MoreSummary
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, Muhammad, and upon all his family and companions.
The circle of taboos in the Jewish Sharia is wider than other laws, as the Jews have severe and very complicated rituals in the matter of food, which may not be found among other people of other religions, as the dietary laws that specify foods and drinks forbidden in the Jewish Sharia include very diverse topics. The Torah specified all these laws with several texts
Field experiment conducted to measured Slippage, Effective field capacity, Field Efficiency, Soil Volume Disturbed and Specific Productivity Tillage in silt clay loam soil with depth 18 cm in Baghdad- Iraq. Split – split plot design under randomized complete block design with three replications using Least Significant Design 5 % was used. Three factor used in this experiment included Two types of plows included Chisel and Disk plows which represented main plot , Three Tires Inflation Pressure was second factor included 1.1 ,1.8 and 2.7 Bar, and Three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Result show chisel plow recorded best parameters performance
The study showed that Imam Said bin Jubair narrated in the transcriber and copied, which took most of the ink of the nation Ibn Abbas (may Allah be pleased with them), which amounted to fourteen novels.
The study also pointed out that the science of transcriber and copied is from the science of the Koran, which can only prove by the novel and the correct transmission of the Prophet Muhammad .
The study also showed that Imam Saeed bin Jubair, who says that it is permissible to copy in the Koran, contrary to what some scholars said that it is not permissible to copy.
The study also pointed to the possibility of copying and that the highest copies of the Koran Koran.
Background: osteoporosis is characterized by a reduction in bone mineral density, skeletal microstructure breakdown, increased bone fragility, and fracture susceptibility. Osteopenia is the preceding step to osteoporosis because it causes a decrease in bone mass, osteoporosis reduces a person's quality of life. Periostin (encoded by Postn), its name is derived from the fact that it was first detected in periosteal osteocytes and osteoblasts. Periostin deficiency has been linked to osteoporosis and weak bones. Study objectives: The purpose of this study was to determine periostin levels in serum of Iraqi patients with osteoporosis and osteopenia, and it is also possible to consider periostin as a diagnostic factor to follow the progression o
... Show MoreFace recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima
... Show MoreSurge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins
... Show MoreThe technique of integrate complimentary details from two or more input images is known as image fusion. The fusion image is more informational and will be complete more than any of the original input images. This paper Illustrates implementation and evaluation of fusion techniques used on the Satellite images a high-resolution Panchromatic (Pan) and Multispectral (MS). A new algorithm is proposed to fuse a Pan and MS of the lowresolution images based on combining IHS and Haar wavelet transform.Firstly, this paper clarifies the classical fusion by using IHS transform and Haar wavelet transform individually. Secondly proposition new strategy of combining the two methods. Performance of the proposed method is evalua
... Show MoreThe results of the historical review of social and political realities in general show that the practical and procedural applications of social engineering as a particular activity primarily of the social and political characteristics of man and society emerged in modern Western societies before appearing in other societies, These results also show that the emergence of these practical reasons and their applications in the West has also seen the emergence of modern theoretical foundations there, which seems to be the usual and usual context everywhere and in most or not all areas of life. Since the social and political dimensions are intertwined in human life and are in full, comprehensive and lasting harmony, interest in this geometry h
... Show More