Preferred Language
Articles
/
9hewQJMBVTCNdQwCY89_
Carbon Dioxide Availability in Inlands Rivers Is Driven by Dissolved Organic Carbon, Not Warming: A Case Study of Tigris River
...Show More Authors

الانهار اصبحت مشبعة بثاني اوكسيد الكربون بشكل عالي وبذلك فهي تلعب دور مهم في كميات الكربون العالمية. لزيادة فهمنا حول مصادر الكربون المتوفرة في النظم البيئية النهرية، تم اجراء هذه الدراسة حول تأثير الكربون العضوي المذاب والحرارة (العوامل الرئيسية لتغير المناخ) كمحركات رئيسية لوفرة ثاني اوكسيد الكربون في الانهار. تم جمع العينات من خمسة واربعون موقع في ثلاثة اجزاء رئيسية لنهر دجلة داخل مدينة بغداد خلال فصلي الخريف والشتاء. اظهرت الدراسة ان جميع المتغيرات المدروسة (الحرارة، الأس الهيدروجيني، الكربون العضوي المذاب، وثاني اوكسيد الكربون) تتغير مع الوقت. كانت التغيرات في تركيز ثاني اوكسيد الكربون مرتبطة ايجابيا بالتغيرات في تركيز الكربون العضوي المذاب وليست بتغير درجات الحرارة. نتائجنا بشكل عام تشير الى ان الزيادة بتراكيز ثاني اوكسيد الكربون في الانهار هو نتيجة لزيادة المدخلات من الكربون العضوي المذاب. وبذلك نستنتج ان الزيادة في تراكيز الكربون العضوي المذاب في الأنهار مطلوبة كمصدر لثاني اوكسيد الكربون من خلال عمليات التنفس الميكروبي والتحلل الكيميائي.

Scopus Clarivate Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 07 2025
Journal Name
The Peerian Journal
Plant-Bacterial Interactions: A latent Alliance for Growth promotion and Environmental Stress Tolerance
...Show More Authors

This encapsulates the general relationship between plant and bacteria in the natural and agricultural ecosystem. It is based on the activities of useful bacteria, such as plant growth-promoting bacteria (PGPRs) and nitrogen-fixing bacteria, in promoting plant growth and plant tolerance to stressful situations regarding pollution, salinity, and drought. The article also mentions that the bacteria maintain plant health by secretion of phytohormones, nitrogen fixation, solubilization of phosphate, and production of antibiotics against pathogenic bacteria. The article also mentions the existing applications of the interaction in sustainable agriculture and bioremediation of contaminated soils.

View Publication Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 06 2013
Journal Name
Robotica
Function approximation technique-based adaptive virtual decomposition control for a serial-chain manipulator
...Show More Authors
SUMMARY<p>The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr</p> ... Show More
View Publication
Scopus (27)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
Molecules
A Comprehensive Review for Groundwater Contamination and Remediation: Occurrence, Migration and Adsorption Modelling
...Show More Authors

The provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech

... Show More
View Publication
Scopus (124)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref