Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Standard Precipitation Index (SPI), Standard Evapotranspiration Index (SPEI), and Palmer Index (PI). According to the researchers in hydrology and for the most accurate description of the drought, more than one indicator for drought should be used. Most reviewed studies recommended using the Standard Precipitation Index (SPI) as the best indicator to describe the drought.
The division partitioning technique has been used to analyze the four electron systems into six-pairs electronic wave functions for ( for the Beryllium atom in its excited state (1s2 2s 3s ) and like ions ( B+1 ,C+2 ) using Hartree-Fock wave functions . The aim of this work is to study atomic scattering form factor f(s) for and nuclear magnetic shielding constant. The results are obtained numerically by using the computer software (Mathcad).
This study included estimation of glutathione (GSH) and Malondialdehyde (MDA) levels in the serum of diabetic patients type II who are treated with a polyherbs mixture (Nigella sativa, Trigonella foenum-graeum, Cyperus rotundus and Teucrium polium) for three months of treatments. Seventy samples of diabetic patients Type II male and females with age about (35-60) years were taken including 44 samples for group one (24 male, 20 female) who used herbs accompanied with chemical treatment (drugs) and 26 samples for the second group (13male and 13 female) who used herbs only. These groups were compared with 60 samples obtained from healthy persons (29 male, 31 female) at the same age of patients as a control group. Effect of age and treatment fo
... Show MoreThe developed financial system is essential for increasing economic growth and poverty reduction in the world. The financial development helps in poverty reduction indirectly via intermediate channel which is the economic growth. The financial development enhancing economic development through mobilization of savings and channel them to the most efficient uses with higher economic and social returns. In addition, the economic growth reduces the poverty through two channels. The first is direct by increasing the introduction factors held by poor and improve the situations into the sectors and areas where the poor live. The second is indirect through redistribution the realized incomes from the economic growth as well as the realiz
... Show MoreGas and downhole water sink assisted gravity drainage (GDWS-AGD) is a promising gas-based enhanced oil recovery (EOR) process applicable for reservoirs associated with infinite aquifers. However, it can be costly to implement because it typically involves the drilling of multiple vertical gas-injection wells. The drilling and well-completion costs can be substantially reduced by using additional completions for gas injection in the oil production wells through the annulus positioned at the top of the reservoir. Multi-completion-GDWS-AGD (MC-GDWS-AGD) can be configured to include separate completions for gas injection, oil, and water production in individual wells. This study simulates
The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
A collection of 118 specimens of Iraqi phasianid birds belong to four species was examined
for haematozoa. Results show that 21.2% of them were infected with one or more of four
species of blood parasites; Haemoproteus danilewskyi, H. santosdiasi, Plasmodium sp. and
microfilaria. Haemoproteus danilewskyi is reported here for the first time in Iraq.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More