The Ozone Monitoring Instrument (OMI) measures the reflected solar radiation in the ultraviolet and visible part in the spectral range that is between 270 and 500 nm, using two channels with a spectral resolution of about 0.5 nm. Ground-level tropospheric ozone is one of the air pollutants of most concern. In the troposphere, near the Earth's surface, human activities lead to ozone concentrations several times higher than the natural background level. To evaluate the ozone distribution over Iraq, the ozone data from OMI were analyzed using geostatistical techniques. Theoretical spherical models provided the best fit for all monthly experimental variograms. The parameters of these variograms (sill, range and nugget) wer
... Show MoreOne of the most important processes to obtain gasoline with high octane numbers is isomerization. In this paper, Pt/TiO2 was prepared successfully by using the sol–gel method by hydrolysis of titanium tetraisopropoxide as a titania source with ethanol and then platinum was loaded on the synthesized catalyst; the result shows that the sample prepared has a good crystallinity with a surface area of about 85 m2 /g and a pore volume of 0.1938 cm3 /g, while XRD shows that the prepared sample was anatase phase. The efect of both temperature and liquid hourly space velocity of the prepared catalyst was achieved by hydroisomerization of n-hexane in a fxed bed reactor with a temperature of 200–275 °C and LHSV 0.5–2h−1. The results show
... Show MoreMobile ad-hoc networks (MANETs) are composed of mobile nodes communicating through wireless medium, without any fixed centralized infrastructure. Providing quality of service (QoS) support to multimedia streaming applications over MANETs is vital. This paper focuses on QoS support, provided by the stream control transmission protocol (SCTP) and the TCP-friendly rate control (TFRC) protocol to multimedia streaming applications over MANETs. In this study, three QoS parameters were considered jointly: (1) packet delivery ratio (PDR), (2) end-to-end delay, (3) and throughput. Specifically, the authors analyzed and compared the simulated performance of the SCTP and TFRC transport protocols for delivering multimedia streaming over MANETs.
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreIraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.
Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.
Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost
The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn this research work, a modified DCT descriptor are presented to mosaics the satellite images based on Abdul Kareem [1] similarity criterion are presented, new method which is proposed to speed up the mosaics process is presented. The results of applying the modified DCT descriptor are compared with the mosaics method using RMSE similarity criterion which prove that the modified DCT descriptor to be fast and accurate mosaics method.