Preferred Language
Articles
/
5Re0ZZIBVTCNdQwCia5e
Building HEC-RAS model to detect the areas of Water Cycle Interruption in river stream and their sections
...Show More Authors

The purpose of this paper is to build a simulation model by using HEC-RAS software to simulate the reality of water movement in the main river of Basra City (South of Iraq) which is known as Siraji-Khoura River. The main objective of the simulation is to detect areas where the water cycle is interrupted in some stations of the river stream, as this river has become an outlet for the disposal of sewage, leading to pollution and causing weakness in some sections of the river & obstructing the water cycle that takes place between this river and Shatt al – Arab river. A field survey data of the river and its banks were adopted to derive the grades, longitudinal and cross sections of the river, these data included three-dimensional coordinates observed by precise GPS device. Depending on the river's derived sections and elevation of water, a one dimensional unsteady flow model was constructed by HEC-RAS software to simulate the behavior of water flow during the tide periods. The results of simulation illustrated the weak areas that cause obstruction in the water flow within the river stream. It also determines the solid waste accumulation areas and stations where bed level rises from the water levels, causing the water cycle to break down in some parts of the river. Thus, an integrated database for the rivers of the study area was obtained, in order to the correct design decisions that are in the interest of these rivers.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The impact of advancing age on total serum IgE in asthmatic patient
...Show More Authors
 

Abstract

The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The Experience of Disabled Female Students at Academic Study in Saudi Universities
...Show More Authors

The current study aims to examine the experience of female students with disabilities who studying in university in kingdom of Saudi Arabia. To this end, the researcher used semi-structured interview as an instrument to collect the study data which regards as one of the descriptive approach tools. The sample comprised (12) disabled-female students from multidiscipline within both college of arts and college of education. To analyze the collected data, the author utilized a thematic analysis method following six steps as stated by (Braun and Clark, 2006). The findings revealed that disabled students have a high self-confidence which push them forward to take part in activities that hold on campus. Besides, significant variation were shown

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Statistical Methods for Controlling the Quality of Crude Oil Products in Iraq
...Show More Authors

The purpose of this study is to measure the levels of quality control for some crude oil products in Iraqi refineries, and how they are close to the international standards, through the application of statistical methods in quality control of oil products in Iraqi refineries. Where the answers of the study sample were applied to a group of Iraqi refinery employees (Al-Dora refinery, Al-Nasiriyah refinery, and Al-Basra refinery) on the principles of quality management control, and according to the different personal characteristics (gender, age, academic qualification, number of years of experience, job level). In order to achieve the objectives of the study, a questionnaire that included (12) items, in order to collect preliminary inform

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy logic in the estimate of reliability function for k - components systems
...Show More Authors

Abstract:

One of the important things provided by fuzzy model is to identify the membership functions. In the fuzzy reliability applications with failure functions of the kind who cares that deals with positive variables .There are many types of membership functions studied by many researchers, including triangular membership function, trapezoidal membership function and bell-shaped membership function. In I research we used beta function. Based on this paper study classical method to obtain estimation fuzzy reliability function for both series and parallel systems.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Desertification Monitoring in the South-West of Iraqi Using Fuzzy Inference System
...Show More Authors

In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Determination the concentration of radon in human urine using LR-115 detector
...Show More Authors

In the present study twenty samples of human urine were taken
from healthy male and female with different of: ages, occupation and
place of residence. These samples were collected from the hospital to
measure the concentration of radon gas in human urine by using one
of solid state nuclear track detectors LR-115.
The results obtained of the concentrations of radon in healthy human
urine are varying from 2.12×10-3 Bq.l-1 to 4.42×10-3 Bq.l-1 and
these values are less than the allowed limits 12.3×10-3 Bq.l-1.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Science Processes Included in the Teacher's Handbook of Middle School Science Experiments
...Show More Authors

The aim of this research is to uncover the science processes included in the teacher’s guide to scientific experiments for science books for grades (first-second) for the intermediate stage, The research sample included all the scientific experiments contained in the teacher’s guide for scientific experiments for the intermediate stage, The researcher used the descriptive and analytical method, and designed an analysis tool, The content of science operations, and verified its validity and consistency, and after using percentages and ranks for statistical treatment, the research reached the following results: The number of practical experiments varies from one class to another in the intermediate stage, where the highest percentage ap

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
Cheating in E-learning from the perspective of lecturers within Iraqi universities
...Show More Authors

Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth

... Show More
View Publication
Crossref (1)
Crossref