Preferred Language
Articles
/
Jxc9FY0BVTCNdQwCnxHf
Evaluation the Level of Service of Signalized Intersection: Al-Amreia Intersection as a Case Study
...Show More Authors
Abstract<p>One of the main element in the network is the intersection which consider as the critical points because there are many conflict in this element. The capability and quality of operation of an intersection was assessed to provide a better understanding of the network's traffic efficiency. In Baghdad city, the capital of/Iraq the majority of the intersections are operated under the congestion status and with level of service F, therefore theses intersection are consider as high spot point of delay in the network of Baghdad city. In this study we selected Al-Ameria signalized intersection as a case study to represent the delay problem in the intersections in Baghdad. The intersection is located in the west of Bagdad city, this intersection realizes a huge traffic, and there are a lot of tourist attractions near to the study area. The aim of this research is to enhance traffic operations, improve the level of service and decrease the delay in Al-Ameria signalized intersection by examine four suggested alternative. Special teams with a special tools are collected traffic and geometric data for the intersection. HCS 2010 program are used in this study to measure the delay and evaluate the level of service in each approach and for the hall of the intersection. The result of this study show that the intersection is operated under the breakdown condition with level of service F for all approaches. The results highlighted that the fourth alternative is the best suitable suggestion to enhance the level of service for the intersection. The fourth alternative recommended to construct a flyover from the North bound towards the South bound the level of service improve from F to C for the base year and for the target year.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A simple Cascade Method for Mixed Noise Removal
...Show More Authors

Images are usually corrupted by type of noise called "mixed noise ", traditional
methods do not give good results with the mixed noise (impulse with Gaussian
noise) .In this paper a Simple Cascade Method (SCM) will be applied for mixed
noise removal (Gaussian plus impulse noise) and compare it's performance with
results that acquired when using the alpha trimmed mean filter and wavelet in
separately. The performances are evaluated in terms of Mean Squane Error (MSE)
and Peak Signal to Noise Ratio (PSNR).

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Financing Cost Optimization in Construction Sector: A Review
...Show More Authors

The main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Al-mustansiriyah Journal Of Science
A Transfer Learning Approach for Arabic Image Captions
...Show More Authors

Publication Date
Sat Dec 17 2022
Journal Name
Applied Sciences
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
...Show More Authors

Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref