By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
An integrated lithofacies and mineralogical assemblage was used to describe a depositional model and sequence stratigraphic framework of the Maastrichtian–Danian succession in the Western Desert of Iraq and eastern Jordan. Fifteen lithofacies types were grouped into three associations recognized in a distally steepened ramp characterized by an apparent, distinct increase in a gradient paleobathymetric deepening westward. The clay and nonclay minerals are dominated by smectite and palygorskite, with trace amounts of kaolinite, sepiolite, illite and chlorite. Meanwhile, quartz, calcite, dolomite, opal CT (Cristobalite - Tridymite), and apatite are the main nonclay minerals. The widely dominated smectite in the Western Phosphatic Basin of Ir
... Show MoreThe present research deals with the spatial variance analysis in Jwartadistrict and conducting a comparison on the spatial and seasonal changes of the vegetation cover between (2007-2013) in order to deduce the relationship between the vegetation density and the areas which are exposed to the risk of water erosion by using Plant Variation Index NDVI) C (coefficient and by using Satellite images of Landsat satellite which are taken in 2/7/2007 and Satellite images of Landsat satellite taken in 11/1/ 2013, the programs of remote sensitivity and the Geographic Information Systems.
The study reveals that there is a variance in the density of vegetation cover of the area under study betwee 2007 and 2013. Howev
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreReceipt Date:10/11/2021 Acceptance Date:29/12/2021 Publication Date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The study aimed to clarify the conceptual explanations and the theoretical rooting of the concept of the populist phenomenon. And explore the political and cultural implications and connotations contained in populist political discourse. And to stand on the foundations and meanings on w
... Show MoreThis study examines traveling wave solutions of the SIS epidemic model with nonlocal dispersion and delay. The research shows that a key factor in determining whether traveling waves exist is the basic reproduction number R0. In particular, the system permits nontrivial traveling wave solutions for σ≥σ∗ for R0>1, whereas there are no such solutions for σ<σ∗. This is because there is a minimal wave speed σ∗>0. On the other hand, there are no traveling wave solutions when R0≤1. In conclusion, we provide several numerical simulations that illustrate the existence of TWS.
Abstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreBecause of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th
... Show MoreMeasuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More