In this work, a large part of Baghdad University campus has been selected. The determination of Geoidal height for the local area requires Ground Control Points which both Ellipsoidal and Orthometric heights are known to compute the difference between them. The first step of the leveling process began by selected the Ground Control Points (GCPs) around the area of the work, and then divided them into two groups of the network traverse stations. They were leveled and adjusted depend on the number of the Bench Marks (B.M.s). Total Station TS (Nikon Nivo 5C) and Global Positioning System (GPS-Garmin 78 map) are used to do this application. The aim of the proposed work was to determine the height of the Geoid surface in the study area. The Geoidal height is calculated from the difference between the two different heights (Orthometric and Ellipsoidal) for the same point and using Geoid Model (EGM) method, then to compare between them. Maximum and the minimum values for the Geoid Undulation are (1.6261 m), and (1.5964 m) respectively with average (1.61 meter) by using (EGM 2008). When it is used the difference method (h-H), maximum and the minimum values for the Geoid Undulation are (5 m), and (2 m) respectively. Finally, the model EGM-2008 represents the best method to determine the Geoid Undulation. dN value between the two different methods is a maximum (3.40) m, a minimum (0.40 m), the average value (1.5 m), and a standard deviation (SD)= ±0.030. At last, image map was produced using Arc GIS 10.1.
Calculations of sputtering yield for Lithium,Sodium and Krypton bombarded by the same own ions are achieved by using TRIM program.The relation of angular dependent of sputtering yield for each ion/target is studied. Also, the dependence of the sputtering yield of target on the energy of the same ion is discussed and plotted graphically. Many researchers applied polynomials function to fit the sputtering data from experimental and simulation programs, however, we suggest to use Ior function for fitting the angular distribution of the sputtering yield. A New data for fitting coefficients of the used ion/target are presented by applying used function for the dependence of the sputtering yield on the ion energy.
The process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel
... Show MoreIn this research , Aprocess ( LICVD) was used for producing silicon nitride powders with chemical compositon Si3N4 ,by using TEA-Co2 Laser to induc reaction in the gas phase, NH3 was used as on additive to SiH4. Reactant gases that were vibrationaly heated by absorbing energy emitted from TEA-Co2 Laser decomposes throug coillsion assisted multiple photon dissociation causing Si3N4 powders. By the dependence of the LICVD process on varios parameters such as Laser intensity , total gas pressure, partial pressures of SiH4 and NH3 were investigated. Dissociation rate as a function of Laser intensity and pressure was investigated. The powders obtained exhibit various colors from brown which is rich in Si to white.This
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreIn the light of the globalization Which surrounds the business environment and whose impact has been reflected on industrial economic units the whole world has become a single market that affects its variables on all units and is affected by the economic contribution of each economic unit as much as its share. The problem of this research is that the use of Pareto analysis enables industrial economic units to diagnose the risks surrounding them , so the main objective of the research was to classify risks into both internal and external types and identify any risks that require more attention.
The research was based on the hypothesis that Pareto analysis used, risks can be identified and addressed before they occur.
... Show MoreWhile analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More