Preferred Language
Articles
/
LhZmGIcBVTCNdQwC1jaP
Evaluation of a fire safety risk prediction model for an existing building
...Show More Authors
Abstract<p>Fire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA2016) code. The concept of giving weight to each criterion was adopted to classify the criteria according to their importance and then conduct an on-site examination of these existing buildings to test the selected criteria. The result indicates a possible fire risk in these buildings due to the lack of compliance with fire safety instructions in the approved codes.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
المجلة السياسية والدولية
Foreign Policy and Asymmetric Threats The United States after 2001 as a model
...Show More Authors

يشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا

... Show More
Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
Seismic Vulnerability Assessment of Rizgary Hospital Building In Erbil City, the Capital City of KR of Iraq
...Show More Authors

Collapsing building structures during recent earthquakes, especially in Northern and Eastern Kurdistan, including the 2003 earthquake in Cewlig; the 2011 earthquake in Van; and the 2017 earthquake near Halabja province, has raised several concerns about the safety of pre-seismic code buildings and emergency facilities in Erbil city. The seismic vulnerability assessment of the hospital buildings as emergency facilities is one of the necessities which have a critical role in the recovery period following earthquakes. This research aims to study in detail and to extend the present knowledge about the seismic vulnerability of the Rizgary public hospital building in Erbil city, which was constructed before releasing the seism

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Structural Engineering
Experimental and Numerical Evaluation of a Welded Demountable Shear Connector through Horizontal Pushout Tests
...Show More Authors

A novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode

... Show More
View Publication
Scopus (21)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Sep 19 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The antibacterial evaluation of dandelion extracts as root canal irrigating solutions (A comparative study)
...Show More Authors

Background: Irrigation has a central role in endodontic treatment. Several irrigating solutions have the antimicrobial activity and actively kill bacteria and yeasts when introduced in direct contact with the microorganisms. The purpose of this study was to evaluate the antimicrobial effectiveness of Dandelion (Taraxacum officinale) root and leaf extracts as possible irrigant solutions, used during endodontic treatments, and both were compared to Sodium hypochlorite, Propolis and Ethyl alcohol. Materials and Method: Forty seven human extracted single rooted teeth were selected. The teeth were decoronated using a diamond disk to have a length of 15 mm ±1 mm and they were instrumented using the hybrid technique. All roots were sterilized

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (20)
Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Al-kindy College Medical Journal
Evaluation of Application of Nutritional Status Assessment for Children Under 5 years by Using IMCI Program in a Sample of Primary Health Care Centers in Baghdad City
...Show More Authors

Background: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.

Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.

Methods:  A cross sectional study with analytic element was conducted during the period from 15th  of January till 15th  May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2

... Show More
View Publication Preview PDF
Crossref