Preferred Language
Articles
/
54YdsoYBIXToZYAL97C2
Calibration and analysis of the potable water network in the Al-Yarmouk region employing WaterGEMS and GIS
...Show More Authors
Abstract<p>Water supply and distribution networks play an important role in our daily activities. They make a substantial contribution to public health by providing potable water for public consumption and non-potable applications such as firefighters and other purposes such as irrigation. This study used ArcMap 10.8 and WaterGEMS CONNECT Edition update 1 version to create a hydraulic network model to simulate the pipes’ network. Detailed network information, including pipe lengths, layouts, and diameters, was given by the Baghdad Water Department. The TUF-2000H Handheld digital ultrasonic flow meter has been used to measure the water flows in the network’s source nodes. In eight junctions, the model was calibrated by measuring the pressures using the Bourdon gauge at selected junctions. The analysis was based on the steady-state time at the average demand. The analysis results showed that the pressures in the network ranged from 8 to 21 m H<sub>2</sub>O with a correlation coefficient of 0.988, with a noticeable decrease in pressures in the distant pipes from the sources supplying water to the network. The velocity of the main pipes was within acceptable limits 0.5–2 m/s. While for the internal distribution network, it was noticed that there is an increase in velocity for the main pipes due to low consumption in the lateral pipes.</p>
Scopus Clarivate Crossref
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The Scientific Trips Set Out by Scholars of Marrouzzeen and Baihaq Between each Other in the 5th and 6th Hijrah Centuries
...Show More Authors

The present paper aims at finding out the Variance Ratio of Trips Set Out by Scholars of Both Marrouzzeen and Baihaq  .The researcher has come up with conclusion including certain findings ,one of which is that the trip is considered an essential base with high effectiveness since  the old times and has been evolved .This means that the trip has been the main source of  knowledge and sciences from the scholars directly .This had driven the scholars of both Baihaq and Marrouz cities .It has been noticed , though this paper, that the number of the Marrouz scholars who visited was less than those of Baihaq . The researcher has focused on their meetings or conferences and investigated what has been going on in suc

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Renzulli Model on Achievement and Holistic Thinking among Fifth Grade Students in the Holy Quran and Islamic Education
...Show More Authors

The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (3

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 16 2024
Journal Name
International Development Planning Review
RESISTANCE TRAINING IN THE WEIGHT OF DIFFERENT BODY PARTS AND THEIR EFFECT ON SOME MECHANICAL BIO VARIABLES AND THE ACHIEVEMENT OF THE HIGH JUMP FOR YOUNG PEOPLE
...Show More Authors

The study aims to identify the effect of training with weight added to different parts of the body in improving the biomechanical variables of the last step and upgrading the high jump for young people, the research was applied to one of the elite high jumpers for young people, and video imaging and kinetic analysis were conducted to extract the variables under study, and then the jumper underwent For the proposed exercises by 3 training units per week for a period of (8) weeks, in which emphasis was placed on improving the rotational forces (moments) of these parts, and then the post-tests were conducted, and the researcher concluded that the exercises applied and the added weights for all parts of the body (leg, thigh, trunk, and arms) le

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Artificial Neural Network Model for Wastewater Projects Maintenance Management Plan
...Show More Authors

Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF