Carbon Monoxide (CO) has a significant indirect effect on greenhouse gasses due to its ozone and carbon dioxide precursor, and its mechanism of degradation involving the hydroxyl radical (OH) which control the oxidizing ability of the tropospheric. To understand the effect of human activities on atmospheric composition, accurate estimates of the sources of atmospheric carbon monoxide (CO) are necessary. MOPITT (Measurements of Pollution in the Troposphere) is a NASA Terra satellite instrument designed to allow both Thermal-Infra-Red (TIR) and Near-Infra-Red (NIR) observations to be used to collect vertical CO profiles in the Troposphere via the concept of correlation spectroscopy. The objective of the current study is to analyze and map the monthly, seasonal and annual trend of CO concentration for year 2016 in Nineveh governorate using the retrieved CO Surface Mixing Ratio Day mode of level 3, version 7 dataset. The dataset was downloaded from the National Aeronautics and Space Administration (NASA) operated GIOVANNI portal. The results of dataset analysis in GIS software showed many sources of carbon monoxide in Nineveh Governorate, which change with months and seasons of the year. Generally, the observed CO concentration levels in the southern and western of the governorate were more than in the northern and eastern parts. The annually average CO ranges from (115.374 ppbv) to (132.452 ppbv). Also, CO emissions and concentrations were higher in winter (128.638-157.567 ppbv) than summer season (97.144-106.515 ppbv).
The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.
This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin
... Show MoreSewage water is a mixture of water and solids added to water for various uses, so it needs to be treated to meet local or global standards for environmentally friendly waste production. The present study aimed to analyze the new Maaymyrh sewage treatment plant's quality parameters statistically at Hilla city. The plant is designed to serve 500,000 populations, and it is operating on a biological treatment method (Activated Sludge Process) with an average wastewater inflow of 107,000m3/day. Wastewater data were collected daily by the Mayoralty of Hilla from November 2019 to June 2020 from the influent and effluent in the (STP) new in Maaymyrh for five water quality standards, such as (BOD5), (COD), (TSS), (TP)
... Show MoreThe prepared nanostructure SiO2 thin films were densified by two techniques (conventional and Diode Pumped Solid State Laser (DPSS) (532 nm). X-ray diffraction (XRD), Field Emission Scanning electron microscopy (FESEM), and Atomic Force Microscope (AFM) technique were used to analyze the samples. XRD results showed that the structure of SiO2 thin films was amorphous for both Oven and Laser densification. FESEM and AFM images revealed that the shape of nano silica is spherical and the particle size is in nano range. The small particle size of SiO2 thin film densified by DPSS Laser was (26 nm) , while the smallest particle size of SiO2 thin film densified by Oven was (111 nm).
The current research aims to identify the most important green productivity tools GPT and the possibility of applied in industrial companies in general and the companies operating in the province of Nineveh, in particular, as well as the study of some personality characteristics and functional, which is believed to be an impact on the application of these tools in industrial companies. Accordingly, the research community of managers in the company of medicines and medical supplies ready-made clothes _ operating in the province of Nineveh, who are (80) while the manager was subjected to research procedures (49) Director representing (61.25%)
... Show MoreNonlinear differential equation stability is a very important feature of applied mathematics, as it has a wide variety of applications in both practical and physical life problems. The major object of the manuscript is to discuss and apply several techniques using modify the Krasovskii's method and the modify variable gradient method which are used to check the stability for some kinds of linear or nonlinear differential equations. Lyapunov function is constructed using the variable gradient method and Krasovskii’s method to estimate the stability of nonlinear systems. If the function of Lyapunov is positive, it implies that the nonlinear system is asymptotically stable. For the nonlinear systems, stability is still difficult even though
... Show MoreThe major climate changes that have affected the planet in addition to wave the big drought plaguing the study area, including the lack of water for imports Badra River fatigue because of the Iran constructing dams on this river and make use of the waters for the benefitof its territory. The subject of finding sources of water has become available with the possibility of exploiting them in an exemplary manner is one of the key things in order to be exploited somewhere.
The study area was chosen within the eastern border of the province of Wasit within the district of Badra border, an area of (1557.5 km2) almost "to study the characteristics of hydrological and identify possibilities for water harvesting them. In this study was conduct
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreFeature selection, a method of dimensionality reduction, is nothing but collecting a range of appropriate feature subsets from the total number of features. In this paper, a point by point explanation review about the feature selection in this segment preferred affairs and its appraisal techniques are discussed. I will initiate my conversation with a straightforward approach so that we consider taking care of features and preferred issues depending upon meta-heuristic strategy. These techniques help in obtaining the best highlight subsets. Thereafter, this paper discusses some system models that drive naturally from the environment are discussed and calculations are performed so that we can take care of the prefe
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show More