ArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, automation of drainage network extraction from DEMs is an efficient way and has received considerable attention. This study aims to extract drainage networks from Digital Elevation Model (DEM) for Lesser Zab River Basin. Composition parameters of the drainage network including the numbers of streams and the stream lengths are derived from the DEM beside the delineation of catchment areas in the basin. The results from this application can be used to create input files for many hydrologic models.
This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor
... Show Moreتم استخدام خرائط ضبط الجودة الإحصائية لتقييم جودة الخدمة التعليمية في جامعة الباحة، ويهدف هذا البحث إلى استخدام خرائط ضبط الجودة الإحصائية لقياس مستوى الجودة وفجوة الجودة بين توقعات الطلبة وإدراكاتهم لمستوى الخدمة الذي تقدمه جامعة الباحة. حيث تم اختيار عينة من 200 طالب وطالبة عشوائيا باستخدام العشوائية العنقودية من 4 كليات خلال الفترة 01 – 30/2015م، وجمعت البيانات من خلال استبيان جودة الخدمة الذي يقيس ت
... Show MoreThe 17 α-ethinylestradiol (EE2) adsorption from aqueous solution was examined using a novel adsorbent made from rice husk powder coated with CuO nanoparticles (CRH). Advanced analyses of FTIR, XRD, SEM, and EDSwere used to identify the classification parameters of a CRH-like surface morphology, configuration, and functional groups. The rice husk was coated with CuO nanoparticles, allowing it to create large surface area materials with significantly improved textural qualities with regard to functional use and adsorption performance, according to a detailed characterization of the synthesized materials. The adsorption process was applied successfully with elimination effectiveness of 100% which can be kept up to 61.3%. The parameters of ads
... Show MoreIn this paper, the fuzzy logic and the trapezoidal fuzzy intuitionistic number were presented, as well as some properties of the trapezoidal fuzzy intuitionistic number and semi- parametric logistic regression model when using the trapezoidal fuzzy intuitionistic number. The output variable represents the dependent variable sometimes cannot be determined in only two cases (response, non-response)or (success, failure) and more than two responses, especially in medical studies; therefore so, use a semi parametric logistic regression model with the output variable (dependent variable) representing a trapezoidal fuzzy intuitionistic number.
the model was estimated on simulati
... Show MoreSteganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe Geological modeling has been constructed by using Petrel E&P software to incorporate data, for improved Three-dimensional models of porosity model, water saturation, permeability estimated from core data, well log interpretation, and fault analysis modeling.
Three-dimensional geological models attributed with physical properties constructed from primary geological data. The reservoir contains a huge hydrocarbon accumulation, a unique geological model characterization with faults, high heterogeneity, and a very complex field in nature.
The results of this study show that the Three-dimensional geological model of Khasib reservoir, to build the reservoir model starting with evaluation of reservoir to interpretation o
... Show More