Preferred Language
Articles
/
ijs-5864
Study the Wet Region in Anbar Province by Use Remote Sensing (RS) and Geographic Information System (GIS) Techniques
...Show More Authors

Recently, in the last years, the world interested with Ecosystem is increased, and
that is interrelation with global atmospherically, by the existence followed
continuous animate variables, that is immediately influence at ecosystem nature by
inspection systems process such as satellite imagery or aerial photographs, that can
determination the wetland regions which aid fulfillment balance globe ecosystem. In
this study a determination of wetland regions in IRAQ, was done for Anbar
province, because many of regions Saturated with water or sponge and aquatic of
plant, additionally, existence metrology factors that significant role were depended
to be as important factor to define the wetland regions as temperatures, relative
humidity, and rainfall. The ArcMap-GIS tools of interpolation tchniques of IDW
type were applied to interpolate these metrology data exact interpolation.
Also remote sensing is utilized exploitation Landsat satellite imagery production
of 2007 year for March month, and it is processing by vegetables and (water,
rainwater) regions determination, and it may processed variable factors
measurements for metrology subject at regions by determined affirmative influence
wetland activeness by using geographic information system (GIS).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Engineering Journal
the effect of diyala river water qulity on the quality of tigris river water using GIS mapping
...Show More Authors

The assessment of a river water’ quality is an essential procedure of monitor programs and isused to collect basic environmental data. The management of integrated water resources in asustainable method is also necessary to allow future generations to meet their water needs. Themain objective of this research is to assess the effect of the Diyala River on Tigris River waterquality using Geographic Information System (GIS) technique. Water samples have beencollected monthly from November 2017 to April 2018 from four selected locations in Tigris andDiyala Rivers using the grab sampling method. Fourteen parameters were studied which areTurbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, TotalDissolved Solids,

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The possibility using of Accounting Information in Rationalizing the Decisions of Capital Expenditure (A case study: Companies Listed in Khartoum Stock Exchange)
...Show More Authors

The research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Calculation of the Radionuclide Concentrations in Samples of Condiments by Using Gamma Spectroscopy System
...Show More Authors

 The aim of this work  is to evaluate concentrations of  natural and artificial radionuclide  in nine different samples of condiments from local markets.     The concentrations of 238 U , 232 Th ,40k  and 137Cs  were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k  and 137Cs   were found to be in a range of  (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1  respectively. These concentrations are not hazardous to public health and the activities are within the allowed  levels

View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use of lower squares and restricted boxes In the estimation of the first-order self-regression parameter AR (1) (simulation study)
...Show More Authors

Use of lower squares and restricted boxes
In the estimation of the first-order self-regression parameter
AR (1) (simulation study)

View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The use of the genetic algorithm to estimate the parameters function of the hypoexponential distribution by simulation
...Show More Authors

In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Professional Challenges Facing Pharmacists Working at Public Hospitals in an Iraqi Province: A Qualitative Study
...Show More Authors

In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 28 2023
Journal Name
International Journal Of Dentistry
The Effect of Different Obturation Techniques in Primary Teeth on the Apical Microleakage using Endoflas: A Comparative In Vitro Study
...Show More Authors

Objectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Assessing the Groundwater Recharge with Water Balance in Ameriat Al-Falluja City, Al-Anbar Governorate, Western Iraq
...Show More Authors

     This study aims to figure out how to calculate water recharge using the soil conservation service method, one of the most widely used methods for calculating runoff volume following rainfall. The research is being conducted in Ameriat Al-Falluja City, Al-Anbar Governorate. The Iraqi meteorological organization's Baghdad Airport and Al-Ramadi stations provided data on the research area from 1989 to 2020 as total annual rainfall (123.1 mm), the RH% (43%), the mean monthly T (23.6 °C), total evaporation (3169.61 mm), the wind speed (3.1 m/s), and the sunshine duration (9 h/day). The climate of the study area is described as arid. The total evapotranspiration value quantity is 1137.38 mm for the 32-year comparison period, while the

... Show More
View Publication
Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref