A submerged weir is a hydraulic structure utilized to control flow in canals and rivers. Water scarcity is a persistent issue in Iraq, especially during the dry season when irrigation withdrawals reduce downstream water levels in canals (Water is lost from irrigation canals due to seepage, evaporation, and vegetation growth). The final section of the Bani Hassan Canal experiences significant drops in water surface (WS) levels, negatively impacting irrigation efficiency. This study addresses that gap by investigating the use of submerged weirs to enhance water distribution and raise WS in the final 6 km segment of the canal. A one-dimensional (1D) hydraulic mode
Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show MoreMobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show MoreThe aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreHusbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s memb
... Show MoreThe organizational culture is an effective control mechanism that dictates the behavior of employees and according to their intellectual and social orientations, so it is considered a more powerful way to control employee orientations and determine their management according to organizational rules and regulations, as it was one of the most important factors determining the performance of organizations, while organizational performance is a measure of what the organization has achieved from the objectives of the scheme To ensure that it faces various changes and remains within the global competition, and to reach that it was necessary to identify the most prominent and most important research problems in knowing the extent of com
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More