Preferred Language
Articles
/
Uheuoo4BVTCNdQwC51b6
The Prospective of Artificial Neural Network (ANN’s) Model Application to Ameliorate Management of Post Disaster Engineering Projects
...Show More Authors

Currently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practical solution for a problem occurring in a projects starting from individual self-development ending to the adaptation to information technology sector with a continuous posting in this world of information industry where as metaphor “needs is a cause of creativity”. This study focuses on the use of artificial neural networks ANN to find a solution to issues in projects delays and furthermore when there is no physical or mathematical solution found so far. ANN’s were used to build a model that helps in finding a solution for delays in some selected projects in Baghdad (as case study), and discussing the strategies of rebuilding plus delays in time and cost due to delay factors. 35 construction projects were chosen in Baghdad greater area, vary in sizes and types. Crew and laborers were targeted in sampling collection methodology basically throughout questionnaire forms of field survey as they were filled by them. ANN’s helped in modelling delays factors to help decision makers in an appropriate management of projects. External factors which includes disasters mentioning COVID-19 as the most important disaster ever happened in the last decades, were the most important factor that caused delay in time and cost of projects implementation processes where this factor was controlling the other major factors such as contractor failure, redesigning, changing orders, security issues, low prices, besides weather issues and owner failure.

Crossref
View Publication
Publication Date
Tue Sep 26 2023
Journal Name
Brazilian Journal Of Biometrics
Bifurcation analysis of commensalism intraction and harvisting on food chain model
...Show More Authors

In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Al–bahith Al–a'alami
Analytical Study of Cartoon picture AL-Mada Newspaper is a model
...Show More Authors

The researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Water Resource And Hydraulic Engineering (jwrhe)
Large Scale Field Physical Model Simulation of Roseires Dam-Break, Sudan
...Show More Authors

Physically based modeling approach has been widely developed in recent years for the simulation of dam failure process due to the lack of field data. This paper provides and describes a physically-based model depending on dimensional analysis and hydraulic simulation methods for estimating the maximum water level and the wave propagation time from breaching of field test dams. The field physical model has been constructed in Dabbah city to represent the collapse of the Roseires dam in Sudan. Five cases of a dam failure were studied to simulate water flood conditions by changing initial water height in the reservoir (0.8, 1.0, 1.2, 1.4 and 1.5 m respectively).The physical model working under five cases, case 5 had the greatest influence of t

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
3D geological model of Nahr Umr/Ratawi oil field in Basra
...Show More Authors
Abstract<p>The study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 24th International Conference On Telecommunications (ict)
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Thu Sep 05 2013
Journal Name
Eng. & Tech. Journal
Snubber Network Design for Triac Driving Single – Phase Industrial Heater by Applying Fuzzy Logic Method
...Show More Authors

Power switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Transient Stability Enhancement and Critical Clearing Time Improvement for Kurdistan Region Network using Fact Configuration
...Show More Authors

The Electrical power system has become vast and more complex, so it is subjected to sudden changes in load levels. Stability is an important concept which determines the stable operation of the power system. Transient stability analysis has become one of the significant studies in the power system to ensure the system stability to withstand a considerable disturbance. The effect of temporary occurrence can lead to malfunction of electronic control equipment. The application of flexible AC transmission systems (FACTS) devices in the transmission system have introduced several changes in the power system. These changes have a significant impact on the power system protection, due to differences inline impedance, line curre

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref