Frequent data in weather records is essential for forecasting, numerical model development, and research, but data recording interruptions may occur for various reasons. So, this study aims to find a way to treat these missing data and know their accuracy by comparing them with the original data values. The mean method was used to treat daily and monthly missing temperature data. The results show that treating the monthly temperature data for the stations (Baghdad, Hilla, Basra, Nasiriya, and Samawa) in Iraq for all periods (1980-2020), the percentage for matching between the original and the treating values did not exceed (80%). So, the period was divided into four periods. It was noted that most of the congruence values increased, reached in summer (70%-100%), and decreased somewhat in winter. While the daily treatment using the mean method for the stations Baghdad and Basra (2010-2020), it turns out that most of the congruence values in the summer ranged (70%-100%), but in winter, the congruence is often decreased. Therefore, this method gives high accuracy when treating monthly and daily temperatures in summer and less in winter.
Many researchers tried to prevent or reduce moisture damage and its sensitivity to temperature to improving the performance of hot mix asphalt because it is decreasing the functional and structural life of fixable pavement due to the moisture damage had exposed to it.
The main objective of this study is to inspect the effect of (fly ash “3%, 6%, 12%”, hydrated lime”5%, 10%, 20%” and silica fumes”1%, 2%, 4%) referring to previous research by the net weight asphalt cement as a modified material on the moisture and temperature sensitivity of hot mix asphalt. This was done using asphalt from AL-Nasiria refinery with penetration grade 40-50, nominal maximum size (12.5) mm (surface course) of aggregate and on
... Show MoreEpilepsy is a critical neurological disorder with critical influences on the way of living of its victims and prominent features such as persistent convulsion periods followed by unconsciousness. Electroencephalogram (EEG) is one of the commonly used devices for seizure recognition and epilepsy detection. Recognition of convulsions using EEG waves takes a relatively long time because it is conducted physically by epileptologists. The EEG signals are analyzed and categorized, after being captured, into two types, which are normal or abnormal (indicating an epileptic seizure). This study relies on EEG signals which are provided by Arrhythmia Database. Thus, this work is a step beyond the traditional database mission of delivering use
... Show MoreA geochemical and environmental study was carried out for the sediments of the Southern Neo-Tethys Ocean, represented by the Yamama Formation (Berriasian-Valaganian) in southern Iraq. The formation has a particular reservoir importance. The typical WQ-220 and WQ-280 wells were selected from the West Qurna field. Data of Gamma-ray logs were used for 30 depths of the typical well. Ten core samples were analyzed by X-Ray Fluoresces and total organic matter from both wells. The results showed that shaliness was relatively low, with an average of 16.5%, leading to a decrease in the presence of clay minerals and trace elements because the environment of the Yamama Formation is relatively far away from the coast. Qualitative evaluation of clay
... Show MoreThe study area lies in Wasit governorate south west Kut city, where Al Ahdeb oil field is located to the south of Al Ahrar district. The present study deals with assessment of heavy metals pollution in water by collecting eleven water samples (five samples from drainage and six samples from surface water) in 5th of December 2016. The water samples analysis of heavy elements in the study area shown that water is polluted with high concentration of (Pb, Cd) elements, while the concentration of (Cu, Fe, Zn) in water samples are within the permissible limits of both World Health Organization, and Iraqi standards and there are no hazard effects from these elements. The study detected some diseases that inju
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show MoreThe phenomenon of child labor, any activity performed by a child and represents a contribution to the production, this phenomenon had been rife in Iraqi society, after that the proportion of child labor for the age group (6-14 years) amounting to 3% in 2006, became for the same age group of 8% in 2008*.
It is recognized that each phenomenon reasons, the phenomenon which our atten
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this paper we shall prepare an sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).
In this paper we shall prepare an sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).