the influence of permeability tensor upon drainage of anisotropic soils under ponded water and steady recharge (rainfall) is theoretically investigated. Tensorial permeability has led to the formulation of mixed type partial differential equations. Since there is no analytical solution to this problem, the formulation is therefore solved numerically by the method of finite elements. The finite element formulation is implemented into a computer model which can be applied to any problem of seepage under steady state
conditions. Two different example problems representing two different flow conditions under full anisotropy have been studied. Results of the model for the isotropic case were checked against exact mathematical solutions derived analytically for isotropic soils and found to be accurate which indicates that using this model for anisotropic soils is safe and sound
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreالخلاصة
یعد والت وتمن شاعرا استثنائیا سواء أكان ذلك في المكانة التي یحتلھا في الأدب الأمریكي او في نمط
اع t ذا الإیق t لة ھ t ة وص t وافقي خاص t اع الت t تخدامھ الإیق t ي اس t دي ف t ر تقلی t عرا غی t الشعر الذي یكتبھ. لقد كتب وتمن ش
ل t ة للتوص t ف الطبیع t وافقي لوص t اع ا لت t ن الإیق t تخدم وتم t ر ، اس t بوحدة الكون الذي عبر عنھ في شعره.وبمعنى آخ
نص t ل ال t جام داخ t رابط وانس t یج مت t ھ نس t ق انظم t دف لخل t ھ تھ t اھره أدبی t واف
This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s
... Show MorePhoto citation request in examples Of ascetic poetry in the first Abbasid era
The ability of Cr (VI) removal from aqueous solution using date palm fibers (leef) was investigated .The effects of pH, contact time, sorbets concentration and initial metal ions concentration on the biosorption were investigated.
The residual concentration of Cr (VI) in solution was determined colorimetrically using spectrophotometer at wave length 540 nm .The biosorption was pH-dependent, the optimum pH was 7 and adsorption isotherms obtained fitted well with Langmuir isotherms .The Langmuir equation obtained was Ce/Cs = 79.99 Ce-77.39, the correlation factor was 0.908.These results indicate that date palm fibers (leef) has a potential effect for the uptake of Cr (VI) from industrial waste water.
The current research aims to evaluate the appraisal form for Arabic language teachers in light of comprehensive quality standards by designing standards for the competencies of primary school teacher in accordance with comprehensive quality requirements. The researcher adopted the descriptive approach. The research community included the Arabic language supervisors in the Education Directorates of Diyala Provincial and Baghdad. The research sample consisted of (14) supervisors from the Diyala Provincial Department of Education and the First Rusafa Education Directorate in Baghdad Governorate by (8) supervisors and (6) Supervisors respectively specializing in Arabic language. As for the research tool, questionnaire prepared by the researc
... Show MoreThis paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
The current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have