This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand hours showed that the pumps unit capability cannot cover the high water demand during that time and resulted in a loss of pressure values, which were ranged between 0.2 and 2.1 bar. Moreover, the simulated results of the residual chlorine levels were within the permissible limits of 0.4–0.7 ppm, in different locations in the network. Providing good quality and adequate water supply is an important component for human life development. Modeling WDS is an efficient method of gaining a true understanding of the functioning of the network and determining the factors and conditions affecting the performance of the network.
The CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in
Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
Asthma is one of the most common chronic, non-communicable diseases affecting children worldwide. The estimated prevalence of pediatric asthma in Iraq is 15.8%. Physiologic, inflammatory and structural factors contribute to the development of asthma. Assessment and monitoring of asthma control can be done by a validated children asthma control test (CACT). Management of asthma must address three components which are an appropriate management plan, the most appropriate medication if necessary, and the use of safe and effective medication. The management plan should consider patient counseling and education about the definition of asthma, signs, and symptoms, the pathophysiology of asthma, common triggers for asthma and how can avoid them,
... Show More