The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Abstract: The aim of this study was to identify the Distress Tolerance among the Employees in Media and Communication in Baghdad.and to identify the significance of the differences between sex ,scientific specialization ,age,and marital status. and the researcher used the Distrees Tolerance measure for Simon &Gahar 2005. The sample of the study consisted of(37)Employees.The Scale of Distrees Tolerance were used as the study tools after being checked for their Validity and Reliability. The research results indicated that employees have high scores on the scale of stress tolerance and that there are statistically significant differences between the age groups and between married and unmarried people a
... Show MoreNew designs of solar using ray tracing program, have been presented for improved the performance and the out put power of the silicon solar cell, as well as reducing the cost of system working by solar energy. Two dimensional solar concentrator (Fresnel lenses) and three dimensional concentrators (parabola dish and cassegrain) were used as concentrator for photovoltaic applications (CPV). The results show that the performance efficiency and out power for crystalline silicon solar cells are improved.
Browse Iraqi academic journals and research papers
The study was conducted for the detection of Aflatoxin B1(AFB1) in the serum and urine of 42 early and middle childhood patients (26 male and 16 female ) with renal function disease, liver function disease, in additional to atrophy in the growth and other symptoms depending on the information within consent obtained from each patient, in addition to 8 children, apparently healthy, as the control. The technique of HPLC was used for the detection of AFB1 from all samples. The results showed that out of 42 patient children, 19 (45.2%) gave positive detection of AFB1 in the serum among all age groups patients with a mean of 0.88 ng/ml and a range of (0.12-3.04) ng/ml. This was compared with the cont
... Show MoreStable isotope (?18O, ?D) values were determined along with the chemical compositions at 10 different locations along the Tigris river between Baghdad-Ammara cities of Iraq. The physico-chemical parameters and isotopic data were measured. The sampling site represents 34 % of total Tigris river in the republic of Iraq. The systematically increased in values of stable isotope as move from the downstream of the river and the most significantly appears at Kut lake. This increase occurs as a result of several factors, viz. (a) evaporation occurs low water level in the river and its tributaries, and (b) return flow water to the river from irrigation water in groundwater systems. The change in ion distribution and in the isotopic values related di
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More