A multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates it's capability of preserving the statistical characteristics of the observed series. The preservation was checked by using (t-test) and (F-test) for the monthly means and variances which gives 98.6% success for means and 81% success for variances. Moreover for the same data two well-known models were used for the sake of comparison with the developed model. The single-site singlevariable auto regressive first order and the multi-variable single-site models. The results of the three models were compared using (Akike test) which indicates that the developed model is more successful ,since it gave minimum (AIC) value for Sulaimania rainfall, Darbandikhan rainfall, and Darbandikhan evaporation, while Matalas model gave minimum (AIC) value for Sulaimania evaporation and Dokan rainfall, and Markov AR (1) model gave minimum (AIC) value for only Dokan evaporation).However, for these last cases the (AIC) given by the developed model is slightly greater than the minimum corresponding value.
This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreAn infant incubator in the neonatal intensive care unit (NICU) is a medical instrument of care that provides oxygen, warmth and moisture to a newborn baby. Due to environmental conditions affecting the infants foster babies may experience discomfort and pain at some point. Thus, this study aimed to assess ambient air quality in neonatal incubators to improve the environmental quality of neonatal intensive care units and safety. Air pollutants concentrations consisting of particulate matter (pm2.5, pm10), hydrocarbons (HOCH), volatile organic compounds (VOC), air quality index (AQI), humidity and temperature, were measured at four selected Baghdad hospitals (Al-Karkh and Rusafa) . The results showed that the increase in rela
... Show MoreRepresents the narrative and drama important sources in the serial drama television structure, and the advent of modern narrative techniques within the dramatic structure of the series of television directorial and processors that hired them, form a quantum leap in the level of the emergence of distinct forms of dramatic rely on narrative techniques according to the harmonic fabric is in control of making the form of art. dramatic and running events, but in order to discharge the need to adhere to the basics of drama and adapted within the mediator television capabilities, and narrative to make forms of television series to Atantzm in drift fixed because of the nature of governing structure formalism, this does not mean the existence of
... Show MoreCalcifying epithelial odontogenic tumour (CEOT) is a benign odontogenic neoplasm of epithelial origin that secretes an amyloid‐like protein tending towards calcification. This study aims to describe a case series from Iraq of one of the rarest odontogenic tumours.
Clinical and histopathological analysis of Calcifying epithelial odontogenic tumour cases that are archived at the oral pathology laboratory of the college of dentistry (Baghdad University) from 2000 to 2019.
Six cases of CEOT were regi
Acquisition provisions in Islamic jurisprudence
The optical absorption data of Hydrogenated Amorphous Silicon was analyzed using a Dunstan model of optical absorption in amorphous semiconductors. This model introduces disorder into the band-band absorption through a linear exponential distribution of local energy gaps, and it accounts for both the Urbach and Tauc regions of the optical absorption edge.Compared to other models of similar bases, such as the O’Leary and Guerra models, it is simpler to understand mathematically and has a physical meaning. The optical absorption data of Jackson et al and Maurer et al were successfully interpreted using Dunstan’s model. Useful physical parameters are extracted especially the band to the band energy gap , which is the energy gap in the a
... Show MoreThe aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More