In this research, attempt to overcome and quantities the problem of the large number of frequency of dust storms and the areas that generated and then identifying these areas in order to be held by the agricultural areas, as has been the adoption of many of the techniques and methods of processing image in remote sensing and geographic information systems and linking them together to identify those areas in Iraq or the neighbors, especially the northern and north-west wind of the fact that Iraq is in the northern and north - western most days of the year. Research has included the use of images from the satellite (MODIS) with quality (Aqua) and (Terra) with the assembly of the amount of dust, these storms, it was determining the values of size and density of the dust and the amount (> 10μm) and (ρ = 1.58 mg/m3) respectively, note that this dust has collected from the University of Baghdad during a sandstorm brief summary on July 2010, because this month is the most higher month temperature in the year and it was about 50 thousand ton of dust in each dust storm. To extract all the results and information that obtained from the operations account amounts that the soil is expected calculated annually for these storms and to determine the threshold line density of this dust in the air. Finally, developing a system to monitor these storms, depending on the capacity of scientific instruments of modern used in the countries of the world and its establishment in Iraq.
We prepared polythiophene (PTH) with single wall carbon nanotube (SWCNT) nanocomposite thin films for Nitrogen dioxide (NO2) gas sensing applications. Thin films were synthesized via electrochemical polymerization method onto (Indium tin oxide) ITO coated glass substrate of thiophene monomer with magnesium perchlorate and different concentration from SWCNT (0.012 and 0.016) % in the presence130mL of Acetonitrile used. X-ray diffraction (XRD), Field Emission Scanning Electron microscopy (FE-SEM), Atomic Force Microscope (AFM) and Fourier Transform Infrared Spectroscopy (FT-IR) were used to characterized these nanocomposite thin films. The response of these nanocomposite for NO2 gas was evaluated via monitoring the change
... Show MoreThis research involves the application of spectral indices and GIS techniques coupled with the Analytic Hierarchy Process, to assess Baglia site, eastern Missan, as a water harvesting potential site. The AHP and pairwise comparison have been used through select four criteria including TWI, TRI, MNDWI, and NDSI, which were deemed as impact factors for this study. All these criteria have been weighted according to their significance in the water harvesting system. The findings of the AHP analysis method explained that the WH potential zones in Baglia site were divided into three zones, namely, high, medium, and low suitability. The findings demonstrate that Bglia site, where the highly appropriate zone is located in the deep v
... Show MoreDust can be considered as an important factor in environmental
pollution which has a direct eOect on human health. In this study ,we
attempted to eval uate serum oxidant -antiox idant balance in workers dust exposed continuously and also the effect of iron and silicon content in exposed dust on the mentioned balance .The study included tbrcc groups: A group included 20 workers of building block factories, B group included 20 workers in general company of grains production and C group included 15 healthy' subjects which represented control group. !ron and silicon contents in dust samples of two studied regions were measured. Higher levels o
... Show MoreIn this work, the geomagnetic storms that occurred during solar cycles 23 and 24 were classified based on the value of the Disturbance Storm Time index (Dst), which was considered an indicator of the strength of geomagnetic conditions. The special criterion of Dst >-50 nT was adopted in the classification process of the geomagnetic storms based on the minimum daily value of the Dst-index. The number of geomagnetic storms that occurred during the study period was counted according to the adopted criteria, including moderate storms with (Dst >-50 nT), strong storms with (Dst >-100 nT), severe storms with (Dst >-200 nT), and great storms with (Dst >-350 nT). The statistica
with an organized propaganda campaign. This military campaign was helped to formulate its speech by many institutions, research centers, and knowledge and intelligence circles in order to mobilize public opinion gain supporters and face the opponents by different means depending on a variety of styles to achieve its required effects.
After the US occupation of Iraq, US media fighters sought to influence the Iraqi public opinion and making them convinced them of the important presence of US military forces in Iraq which necessitated finding its justification through the use of persuasive techniques in its intensive propaganda campaigns.
This research discusses the most important
The current challenge facing our age is the information digitization, at the same time, there is a huge development in the interdisciplinary of technologies with sciences. In the last few years, the World witnessed a number of information challenges with different dimensions, including digital dimensions, which are called the digital world and the virtual world for authors and movie writers. Consequently, the digital art concept emerged that utilizes the computer in an efficient way and as a new technique for drawing. This art is considered a great leap for modern art. The influence of digital technology transformed traditional arts like painting and sculpture into new forms, from pure arts to virtual reality. The most important characte
... Show MoreThe digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreThis paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast gene
... Show MoreA binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More