Preferred Language
Articles
/
TxZUU4cBVTCNdQwC0UWL
Mathematical Models for Predicting of Organic and Inorganic Pollutants in Diyala River Using AnalysisNeural Network
...Show More Authors

Diyala river is the most important tributaries in Iraq, this river suffering from pollution, therefore, this research aimed to predict organic pollutants that represented by biological oxygen demand BOD, and inorganic pollutants that represented by total dissolved solids TDS for Diyala river in Iraq, the data used in this research were collected for the period from 2011-2016 for the last station in the river known as D17, before the river meeting Tigris river in Baghdad city. Analysis Neural Network ANN was used in order to find the mathematical models, the parameters used to predict BOD were seven parameters EC, Alk, Cl, K, TH, NO3, DO, after removing the less importance parameters. While the parameters that used to predict TDS were fourteen parameters pH, DO, BOD, PO4, NO3,Ca, Mg, TH, K, Na, SO4,Cl, EC, Alk. The results indicated that the best correlation coefficient is 86.5% for BOD, and the most important parameter is Chloride Cl, and the best correlation coefficient is 95.4% for TDS and the most important parameters are total hardness TH and electrical conductivity EC, according to direct relation between these parameters and TDS.

Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Effect of Tail Regulators on Euphrates River Flood Capacity at Al Nassiriyah City
...Show More Authors

Euphrates River extends about 125 km within the study area located in Annassiriyah City, Dhi Qar Governorate, Iraq. The impact of the seven hydraulic structures on the discharge capacity of the Euphrates River needs to be considered. The main objectives of this research are to increase the discharge capacity of Euphrates River within Annassiriyah City during flood seasons and study the impact of these hydraulic structures on the river capacity by using HEC-RAS 5.0.3 software. Five scenarios were simulated to study the different current condition of Euphrates River within Annassiriyah City. Other additional four scenarios were implemented through river training to increase the river capacity to 1300 m³/s; it is the flood

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Representations of the event in the drawings of the civilizations of the ancient world (selected models)
...Show More Authors

This research is concerned with studying the representations of the event in the drawings of the ancient civilizations of the world, and the research consists of two axes, the axis of the theoretical framework, which included (the research problem, its aim, its limits, and the definition of its terminology).
The research aims to reveal how the event pattern was formulated by the artist on the surface of his visual achievement, and the limits of the search were spatial in the ancient civilizations of Iraq, Egypt, Greece and Rome, but the limits of the temporal research could not be determined because they were before birth, and objectively:
representations of the event in the civilizations of the ancient world This axis also in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Catalysis Science & Technology
Decomposition of selected chlorinated volatile organic compounds by ceria (CeO 2)
...Show More Authors

Chlorinated volatile organic compounds (CVOCs) are toxic chemical entities emitted invariably from stationary thermal operations when a trace of chlorine is present. Replacing the high-temperature destruction operations of these compounds with catalytic oxidation has led to the formulation of various potent metal oxides catalysts; among them are ceria-based materials. Guided by recent experimental measurements, this study theoretically investigates the initial steps operating in the interactions of ceria surface CeO2(111) with three CVOC model compounds, namely chloroethene (CE), chloroethane (CA) and chlorobenzene (CB). We find that, the CeO2(111) surface mediates fission of the carbon–chlorine bonds in the CE, CA and CB molecules via mo

... Show More
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 23 2026
Journal Name
Al–bahith Al–a'alami
New Methods and Old Issues: Theoretical and Methodological Approaches to Social Network Sites in the Arab Region
...Show More Authors

This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The 31th Minisymposium
Towards the Requirement-Driven Generation and Evaluation of Hyperledger Fabric Network Designs
...Show More Authors

View Publication
Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
Towards Space Sensor Network and Internet of Things: Merging CubeSats with IoT
...Show More Authors

View Publication
Scopus Crossref