The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
The Taylor series is defined by the f and g series. The solution to the satellite's equation of motion is expanding to generate Taylor series through the coefficients f and g. In this study, the orbit equation in a perifocal system is solved using the Taylor series, which is based on time changing. A program in matlab is designed to apply the results for a geocentric satellite in low orbit (height from perigee, hp= 622 km). The input parameters were the initial distance from perigee, the initial time, eccentricity, true anomaly, position, and finally the velocity. The output parameters were the final distance from perigee and the final time values. The results of radial distance as opposed to time were plotted for dissimilar times in
... Show MoreThis study is one of the descriptive studies, where the researcher used the survey method, which seeks to provide an accurate and appropriate description of the main and sub-categories of the content of the research for television documentaries on the Iraqi satellite channel, relying on the research questions and objectives to analyze the content of the documentaries according to the approach referred to above. The objectives of the research were summarized to identify the function of the documentary programs in Al-Iraqiya channel to detect the crimes of the former regime, to know the frameworks highlighted by the documentary programs in Al-Iraqiya channel to reveal the crimes of the former regime, to identify the extent of the circ
... Show MoreThe purpose of this research is to explain the effect of the dropping of three zeroes from Iraqi dinar on the basic role of the dinar and derivative and dynamic in transaction of Iraqi economic. the importance of this research comes from the effect of this operation on the evaluation of the exchange between the individuals of Iraqi society and the other between the Iraqi individuals and the foreign whom use the Iraqi dinar as a tool for exchange also the effect of the operation on the reserves of the Iraqi dinar the results of this research are as the following:-
1-the operation of dropping of zeroes must be associated with increase of the sharing of economic sectors wi
... Show MoreThe object of this study is to establish a global model to use of DeNovo programming the strategies of multi-Decision making process in the city of Baghdad.
Thus, we have chosen an important and an effective subject in the life of the citizen due to the importance of this subject in the Iraqi citizen of luck of water and for many reasons.
In this thesis, we have tackled the establishment of a global model to be able to reach solution or an alternative model a money the available alternative.
The alternative proposed here utilizes the application of the (DeNovo) programming approach suggested by (1982) in solving t
... Show MoreIn his study, the researcher highlighted the most important methods of authorship in the fundamentals of jurisprudence and speech. Fundamentalist rules and extraction and access method; they also distinct from each other that each has special divisions of the subjects of jurisprudence.
The cost-effective carbon cross-linked Y zeolite nanocrystals composite (NYC) was prepared using an eco-friendly substrate prepared from bio-waste and organic adhesive at intermediate conditions. The green synthesis method dependent in this study assures using chemically harmless compounds to ensure homogeneous distribution of zeolite over porous carbon. The greenly prepared cross-linked composite was extensively characterized using Fourier transform infrared, nitrogen adsorption/desorption, Field emission scanning electron microscope, Dispersive analysis by X-ray, Thermogravimetric analysis, and X-ray diffraction. NYC had a surface area of 176.44 m2/g, and a pore volume of 0.0573 cm3/g. NYC had a multi-function nature, sustained at a long-
... Show MoreIn this investigation a high density polyethylene (HDPE) was used as a substitute to polyvinylchloride in the production of lead acid battery separators. This has been achieved by preparing mixtures of different percentages of the feed materials which include a high density polyethylene (HDPE) locally produced, filler materials such as silica and oils such as dioctylphthalate (DOP) or paraffin which were added to the mixture to improve the final properties of the separator. The materials were compounded by two roll-mills under the same conditions. The following parameters are involved: &nb
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More