The study showed a significant rise in the proportion of the labor force in agriculture
activity among the detailed economic activities in 1997 with a rate (%28.9), and then
decreased to (%18.8) in 2011, and this belong to the deterioration of agriculture and the
transition to the other economic activities.
2- The highest percentage of male's participation in year 1997 obtained by the activity (A),
which is represented by agriculture , where was (%30.0) while the highest percentage of
female's participation has been brought by the activity (M) which is represented education
with a rate (% 47.9). while in 2011 that the highest proportion of males' concentration
obtained by the activity (L) with a rate (%23.1) while the highest proportion females'
concentration obtained by the activity (M) with a rate (%37.2).
3- The third field (services) came, in the first rank for years 1997 and 2011 with a rate
(%58.9), (%74.8) successively, and the reason of this rise belong to transition the workers
from agriculture and industry to services after the deterioration of agriculture and stopping
most of state's factories on working after year 2003
4- The majority of workers in the districts of the province urban areas are working within the
activities of the third field, which are represented by services and the associated terms, and
had the first rank with the proportion of workers in year 1977 with a rate (%78.3) and then
increased to (%89.8) in year 2011, while the workers in the rural areas that the field of
agriculture had the first rank for the years 1997 and 2001 with a rate (%72.9) in year 1997and then decreased to (%58.8) in year 2011, and the reason for this decline belong to the
orientation of workers in the countryside to work in the services' activity.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreWater injection equipments such as pipelines, which are used in the second recovery of oil in the Al-Ahdeb wells, suffer from the corrosion in water during maintaining vacuum deoxygenated tower that used to decrease concentration of the dissolved oxygen gas in the water from 6.2-9.1 ppm to o.5 ppm. This study involved calculation the corrosion rates of the internal surfaces of the
pipelines either during operation of the vacuum unit or when the tower out of operation. Finally, find the solution by one of the following suggestions. In the first suggestion removal of the dissolved O2 from water is achieved by increasing the dosage of the oxygen scavenger (sodium sulphite). The second suggestion involves removing the dissolved O2 from w
The research aims to indicate the relationship between lean production tools included seven {constant improvement , and Just in time (JIT), and the production smoothing , and quality at the source, and standardized work, Visual management, and activities 5S } and Mass Customization strategy for the model (Pine & Gilomer, 1997) {collaborative, adaptive, cosmetic, transparent}, as well as providing a conceptual framework and applied for variables search to clarify how they will choose a Mass Customization strategy through the lean production tools, , and recognize the reality of the practices of Iraqi industries in such a field. Moreover, aims to highlight the positive aspects that accrue to companies a
... Show MoreThis study showed that liver of Passer domesticus bilobed the right lobe is cardiac shape while the left is elliptical and the liver colour is brown. It is occupying most of anterior and middle parts of abdominal cavity. The liver is surrounded by Glison capsule which is represented by a thin layer of connective tissue with septum extend peripherally in liver tissue. The liver tissue is formed from polyhedral hepatocyte arrange as irregular hepatic cord surrounded the central vein. Each cell contains one or two nucleus with one or more nucleolus. The blood sinusoid appeared between the liver cells .The hepatic cord arranged radially around the central vein. The portal area is clear and surrounded by connective tissue. Gallbladder is almost
... Show MoreHall effect measurements have been made on a-As2Te3 thin films different thickness film in the range (200-350) nm. The Hall mobility in a-As2Te3 thin films decreases with increasing annealing temperature but the carrier concentration increases. When increasing the film thickness increases the Hall mobility decreases, while the carrier concentration increases.