Inundation floodingmap aimedto find outearly warningsto avoidenvironmental damageandhumanin terms of theheight ofthe wave ofwater, speed time arrival, effects of inundation sideanddepth of the water/ distanceand reduce the impact of the flood wave after obtaining the process of collapse of the dam in the lower part of the river to the dam area. The study has been using a numerical model one-dimensional depends on the development of equations (Saint-Venant) so that parts of the river, any river channel main banks of the right and left treated as separate parts, that’s the difference in the characteristics of the hydraulic and engineering, along the line of the flow will take into account in each section of the sections and flow in the river valley. Throughapplied numerical model of the Nile River in the area between the Roseires dam and Khartoum is distance (630 km) south of Khartoum , to get a jest analysis of the impact of a wave of flooding in the river on the following parameters : the maximum discharge , the maximum of attributed, as underdevelopment of the discharge maximum , and the time defaults to the maximum level and the surface area on the banks of the river and its extension and different values of the coefficient of manning roughness to the banks of the river. Eight scenario have been prepared for the flood wave read to compare the effect amount of water flow in the channel resulting from the collapse of the dam was resulting of Roseires dam , eight scenario to represent the five and extract the resulting values of Inundation map to cities located on the downstream of the dam.Thefive scenarioswerecalculated by using (HEC-RAS 4.1.0), (HEC-GeoRAS)a GIS programs and the flood wave resulting from the collapse of the Roseires dam to compare the results showed that the scenario NO. 5 is the best scenario result from the collapse makes sense due to the form of the disposal of the flood wave resulting from the collapse of the Roseires dam and then get overtopping from Sennar dam to the inability of the reservoir and dam to stop the flood wave. The results also indicate that the time needed to reach the greatest discharge of the flood wave resulting from the collapse of the Roseires dam to the city of Khartoum is ( 4, 6, 7and 9 ) day on the cities ( Roseires , Sennar , Wad Medani and Khartoum ) respectively, of the cases . The maximum height of the flood wave reaching the city of Khartoum has given the scenario NO. 5 by height wave (3-50) meters respectively. As well as the delay in the arrival time of the maximum height of the flood wave to the city of Khartoum is one day for the five scenarios compared to the other. The Inundation map development resulting from the collapse of the Roseires dam and get the flow overtopping the Sennar dam, arrival to Khartoum, was determined the surface area of the affected river and both banks of the depth of the wave and latency along the river has been selected four major cities along the river which Roseires,Sennar, Wad Medani and Khartoum.
The assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreNanotechnology is a continually expanding field for its uses and applications in multiple areas i.e. medicine, science, and engineering. Biosynthesis is straightforward, less-toxicity, and cost-effective technology. TiO2 NPs biosynthesis has attained consideration in recent decades. In this study, probiotic bacteria were isolated from cow’s raw milk samples, and then were identified by using the Vitek2 system; as Leuconostoc spp. included Leuconostoc mesenteroides subsp. mesenteroides (Leu.1), Leuconostoc mesenteroides subsp. cremoris (Leu.4), and Leuconostoc pseudomesenteroides (Leu.14). All Leuconostoc spp. isolates showed an ability for TiO2 NPs bio-production, after being incubated at anaerobic conditions (30 o C/ 24 h) in DeM
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show MoreIn this study, the use of non-thermal plasma theory to remove toxic gases emitted from a vehicle was experimentally investigated. A non-thermal plasma reactor was constructed in the form of a cylindrical tube made of Pyrex glass. Two stainless steel rods were placed inside the tube to generate electric discharge and plasma condition, by connecting with a high voltage power supply (up to 40 kV). The reactor was used to remove the contaminants of a 1.25-liter 4-cylinder engine at ambient conditions. Several tests have been carried out for a ranging speed from 750 to 4,500 rpm of the engine and varying voltages from 0 to 32 kV. The gases entering the reactor were examined by a gas analyzer and the gases concentration ratio
... Show More