This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadrilaterals, and central-point figures (which is to be subdivided into: triangle; quadrilateral, and pentagon). The model also has the property of the diverse modes of display for the output results; i.e. the results can be displayed in the shape of TwoDimensional (2-D) and Three- Dimensional (3-D) representations. Visual Basic is the software depended as a main core in designing CISTNM to draw the suggested network in 2-D to display the network point positions and formations, and it can be linked with the available software such as ArcMap (GIS). The input data which is used as an application of the targeted geodetic surveying techniques (triangulation) is Chamchamal region as a case study in this research. The area lies in the north of Iraq. The results obtained after this application and verification, have proved that the CISTNM
can perform the required task easily and accurately.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreFetal growth restriction is a significant contributor to fetal morbidity and mortality. In addition, there are heightened maternal risks associated with surgical operations and their accompanying dangers. Monitoring fetal development is a crucial objective of prenatal care and effective methods for early diagnosis of Fetal growth restriction, allowing prompt management and timely intervention to improve the outcomes. Screening for Fetal growth restriction can be achieved via many modalities; it can be medical, biochemical, or radiological. Some recommended combining more than one for better outcomes. Currently, there is inconsistency about the best method of Fetal growth restriction screening. In this review, a comprehensive
... Show MoreThe Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreIn recent years, there has been a rise in interest in the study of antibiotic occurrence in the aquatic environment due to the negative consequences of prolonged exposure and the potential for bacterial antibiotic resistance. Most antibiotic residues from treated wastewater end up in the aquatic environment as they are not eliminated in facilities that treat wastewater. Antibiotics must be identified in influent and effluent wastewater using reliable analytical techniques for several reasons. Firstly, monitoring antibiotic presence in aquatic environments. Secondly, assessing environmental risks, computing wastewater treatment plant removal efficiencies, and estimating antibiotic consumption. Therefore, this work aims to provide an overview
... Show MoreThe research aims to achieve a set of objectives, the most important of which is determining the extent to which the auditors of the research sample in the Federal Bureau of Financial Supervision adhere to the requirements of the quality control system according to the Iraqi Audit Manual No. The federal financial / research sample with the quality control system according to the Iraqi audit guide No. 7), and the researcher seeks to test the main research hypothesis and sub-hypotheses, and to achieve this, a questionnaire was designed by (Google Form) and distributed electronically to the elements of the research sample, Through the statistical package program (SPSS), the results of the questionnaire were analysed. In light of the applied
... Show MoreAbstract
Bivariate time series modeling and forecasting have become a promising field of applied studies in recent times. For this purpose, the Linear Autoregressive Moving Average with exogenous variable ARMAX model is the most widely used technique over the past few years in modeling and forecasting this type of data. The most important assumptions of this model are linearity and homogenous for random error variance of the appropriate model. In practice, these two assumptions are often violated, so the Generalized Autoregressive Conditional Heteroscedasticity (ARCH) and (GARCH) with exogenous varia
... Show MoreAbstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreAfter the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of