In this study, the synoptic analysis of dust storm for spring and summertime in Iraq were investigated. The images for dust provided by NASA are used to emphasize the dust storm days, while the composite maps of wind vector and geopotential 850hPa are mapped to investigate the pressure and wind direction patterns appearing with the dust condition in the same days. Spring has more dust frequency than summertime, especially in May. The frontal type of dust storm is dominant on spring, the cold air pushes the warm air that picking up the sand to the air through the vertical wind, but the southwestern high-speed wind and drought condition were controlled on the dust in summer. The northwestern wind is the main factor that carries the dust for l
... Show MoreProcess capability provides a quantitative measure for gasoline production conformance to specifications.It was measured throughout four consecutive months of the last quarter of 2011. Results revealed high percentages (up to 44%) of non conforming gasoline blends to Iraqi marketing specifications for petroleum products (2000) by inspecting 122 different samples of Iraqi regular gasoline (RON 85).
Quality cost analysis as an important financial control tool was carried out to evaluate Cost of Quality (COQ) which was large due to non conforming gasoline reached up to (722.8 M.ID) in October. In this research COQ was investigated in order to identify the opportunities of gasoline quality improvements through production process. Also cus
There were signs of the first civilization known to humanity for more than 6000 years BC in the north of Iraq have disappeared this civilization to appear after 500 years in southern Iraq, the Sumerian civilization, which was considered as the opinion of scientists or civilizations, exceeds the impact to Asia and the countries that had been in contact (Sumerians) and see them today in other towns and villages. In subsequent periods of time appeared distinct personalities to their nature, religious, social, special clothing with clothes seem especially long. And usually dress is made from raw wool material making them in the Sumerian era. Put the garment on the body and leaves the top of the right shoulder with the survival of an ope
... Show MoreThe purpose of this paper is to present an approach to compute accurately the distributions of the frictional heat generated, contact pressure and thermal stresses at any instant during the sliding period (heating phase) of the single-disc friction clutch system works in the dry condition and the complex interaction among them.
Numerical work was achieved using the developed elastic and thermal finite element models (axisymmetric models) to simulate the engagement of the single-disc friction clutch system.
تمهيد
غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.
ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More