Preferred Language
Articles
/
bsj-3186
The Al-Abiadh Valley Drainage Basin Environmental Aspects Extraction Using Quantitatively Morphometric Analyses of Shuttle Radar Topographic Mission Data
...Show More Authors

         The accurate extracting, studying, and analyzing of drainage basin morphometric aspects is important for the accurate determination of environmental factors that formed them, such as climate, tectonic activity, region lithology, and land covering vegetation.

This work was divided into three stages; the 1st stage was delineation of the Al-Abiadh basin borders using a new approach that depends on three-dimensional modeling of the studied region and a drainage network pattern extraction using (Shuttle Radar Topographic Mission) data, the 2nd was the classification of the Al-Abiadh basin streams according to their shape and widenings, and the 3rd was extracting then taking up the quantitative analysis technique to estimate the basin morphometric aspects and the basin's environmental parameters that created them.

         The Al-Abiadh valley basin is a six-order one with a dendritic, parallel, and deranged drainage network. The flood hazard is absent at the basin mouth because the valley runoff takes a long time to reach the sink (Al-Razaza Lake), located in the middle part of Iraq, with a low flow peak due to the high permeability soil, the arid to semi-arid climate, and the low annual precipitation rate.

         The region studied is an alluvial basin with similar geological structural solidity in most places. The drainage network was found to be controlled by lineaments and fracture traces; the basin has passed its youth geomorphic phase.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
ptimization the Parameters of Magnetic Abrasive Process Using Taguchi Method to Improve the Surface Roughness
...Show More Authors

Abstract  

Magnetic abrasive finishing (MAF) process is one of non-traditional or advanced finishing methods which is suitable for different materials and produces high quality level of surface finish where it uses magnetic force as a machining pressure. A set of experimental tests was planned according to Taguchi orthogonal array (OA) L27 (36) with three levels and six input parameters. Experimental estimation and optimization of input parameters for MAF process for stainless steel type 316 plate work piece, six input parameters including amplitude of tooth pole, and number of cycle between teeth, current, cutting speed, working gap, and finishing time, were performed by design of experiment

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessing the Environmental Footprint of the Cement Industry: A Pathway to Sustainable Development
...Show More Authors
Abstract<p>Achieving a connection between sustainability processes and environmental protection, or what is known as sustainable development, requires paying more attention to environmental and sustainability issues for various projects and their effects on environmental problems. It involves determining the most appropriate ways to deal with them within pillars of sustainability (environmental, social, economic, and natural resources. As cement is a fundamental component of industrial services and construction in cities, it has a direct and significant interaction with the development process, making it one of the most important industries in Iraq. Because of the clinker particles and combustio</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF