To maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, were used to compare the results of the methods with the provision of a minimal environmental flow. The Tennant method relies on 30 % of the annual discharge rate as the minimum environmental instream flow. The modified Tennant method is based on 30% of the monthly average discharge rate as a minimum environmental instream flow. The 7Q10 method is based on the lowest daily discharge rate in 7 consecutive days for ten years. The results showed that the minimum instream environmental flow given by the Tennant method is 42.26 m3/s while the lowest value of the minimum instream environmental flow obtained from modified Tennant was 37.2 m3/s in January, and the largest value was 47.22 m3/s in August. The one obtained by the 7Q10 method was 50 m3/s in this research.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreFor many years it was argued that there may be a gender differences in adverse drug reactions (ADRs). This assumption was based on many possible factors such as hormonal or behavior differences, and it was not clearly identified since the female gender was not preferred to be enrolled in many clinical trials. The primary aim of this study was to assess the extent of possibly relevant gender differences in drug–ADRs regarding causality, severity, preventability, seriousness, expectedness and outcome. While the secondary aim was to assess for which group of drugs and for which ADRs gender differences are identified most often. The study was a retrospective one that depends on processing a specially selected group of data obtained from th
... Show MoreThe current research aims to examine the willingness to communicate and psychological adjustment of Iraqi EFL undergraduate students. To achieve the main aim, a sample of 100 male and female Iraqis’ undergraduate students studying English as a foreign language was chosen randomly from two different public colleges in Baghdad city for the academic year 2023-2024. Two scales have five Likert alternatives of 17 and 16 items developed by McCroskey & Richmond (1990) and Wais (2010), respectively were administered to the research sample to collect the needed data. The results revealed that Iraqi EFL undergraduate students have a willingness to communicate in the English language. Iraqi EFL undergraduate students have a good level of
... Show MoreThis paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t
... Show MoreThe approval of the federal general budget in Iraq is one of the most important competencies of the legislative authority , Being one of the important financial and monetary policy instruments on which the state depends for its economic growth , Hence, the obstruction of the approval of the federal budget due to sectarian quotas, the absence of national interest, and the emergence of bargaining processes between political parties belonging to the regions and sectarianism , As well as the absence of economic plans and programs as a result of non-cognition and understanding of the nature of its supposed political system applied in Iraq and the absence of specialists would le
... Show MoreConcentrated research topic in the study of variables key to the work of offices of inspectors Amyin ، a (re- design function، and performance Organisational ) and took this message to know the nature of the relationship and the impact of the dimensions of the re- design function as a variable interpretative through its dimensions، is ( the diversity of skill، selecting the task ، the importance of task، autonomy، feedback )، and performance Organisational variable responsive through two dimensions are ( effectiveness ، efficiency )، and in order to test the research hypotheses were absorbed variables in the form of a questionnaire and were questionnaire primary means of gatheri
... Show MoreMonetary policy is an important part of the economic policy to influence the monetary aspect of stabilization, for this reason the research will seek to clarify the extent of the impact of monetary policy in achieving monetary stability in Iraq during the chosen research period, because the Iraqi economy suffers from monetary instability due to political and security turmoil, Therefore, an effective and effective monetary policy is required in terms of reducing inflationary pressures to reach the required monetary stability, in order to create the appropriate monetary environment for the work of the economic and productive sectors. Thus, the research adopted a basic hypothesis that monetary policy in Iraq has a clear impact on achieving mon
... Show More