Preferred Language
Articles
/
bsj-6959
Modeling The Power Grid Network Of Iraq
...Show More Authors

Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visualized and analyzed according to the theory of Complex Networks by representing the stations as nodes and the transmission lines as edges. This analysis is done by applying network metrics to the proposed national IPG network. Finally, this work provides a professional visualization of the generated network based on the demographic distribution and the accurate coordinates of the power stations. Thus, this proposed network is useful for the Iraqi Ministry of Electricity. Besides, it can be adopted by officials and specialists to understand, visualize and evaluate the performance of the current IPG network since it is still under development and modernization.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Incidence of intestinal parasitic infections among random samples at Al- Aziziyah hospital in Wasit province/Iraq
...Show More Authors

                  

     The study is designed to identify intestinal parasitic infections examined at Al-Aziziyah Hospital in Wasit Governorate in Iraq. In this study, a total of (460) internal and external patients were monitored for intestinal parasitic infections. All stool samples were analyzed by the direct method (microscopic exam.) to discover the trophozoite stages and cyst stages for intestinal protozoan parasites. The most incidence parasites in different sex, area residence and different age groups. Out of (460) patient sample were infected with 217 at a percentage of (47.17%), 101(46.5%) were for males and 116 (53.5%) were for females. It was found that the numbers and percentages of a single (one

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Comparative Study of Heavy Metals and Trace Elements Concentration in Milk Samples Consumed in Iraq
...Show More Authors

The measurements of major and trace elements in different brands of milk powder selected from the Iraqis market via the X-ray fluorescence (XRF) Technique have been studied in the present work. The result of the measurements reveals the high concentrations of sodium, phosphorus, sulfur, chlorine, potassium, calcium and magnesium. Furthermore, low concentrations of aluminum, silicon, iron, bromine, molybdenum, iodine, barium, titanium, manganese, cobalt, chrome, nickel, copper, zinc and lead were detected. Neutron activation analysis (NAA) and Kjeldahl technique were also employed to determine the concentrations of nitrogen. It was found that the nitrogen concentration was in the range of (1.96 - 3.23) % which is within the permissible li

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Morphological and Molecular Identification of Limnodrilus Claparede,1862 Species(clitellata: naiDIDAE) IN Tigris River, Baghdad/Iraq
...Show More Authors

Sludge worm samples were collected from the Tigers River sediment during the period from November 2018 to June 2019 in Al Sarafiya District/ Baghdad- Iraq. Biometric morphological measurements focusing on the form of penis sheath and chaetal morphology were used for species identification, in addition to molecular analysis by amplification of conserved 18s rRNA encoding gene using ITS1 and ITS4 universal primers.According to the morphological measurement records, the results revealed the existence of Limnodrilus hoffmeisteri Claparede 1862, L. claparedeianus Ratzel, 1868 and L. cervix Brinkhurst 1963. Other two groups of specimens, with short penis sheath, were identified by molecular technology as L

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial and administrative corruption: concept, causes, types and ways to address them in Iraq
...Show More Authors

Abstract:-

The phenomenon of financial and administrative corruption is not the result today, but not tied to time or designated place, he is the scourge is rampant in all countries of the world, without exception, those developed and developing, a phenomenon that crossed national boundaries and become withstand a global character, and corruption is limited to communities of particular economic systems without the other, but suffered Throughout history most societies to varying degrees, Iraq is one of the countries that suffered and continues to suffer from corruption, which has become, B grumble in most of the Iraqi state institutions, especially after the occupation in 2003 as administrative corruption in Iraq arrived i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of insider trading in accounting information on the investors decisions: An Applied Study In a sample of corporation listed in Iraq Securities Exchange
...Show More Authors

This research aims to discuss an important issue because of its role in increasing the efficiency of financial markets and boost investor confidence by a insider trading, which arises as a result of leaking secret information to some investors and reliable in the process of trading shares in the Iraq Stock Exchange And thus obtain abnormal profits at the expense of other investors. Research was based on the assumption that " Where shortcomings in local regulations relating to disclosure and insider trading in accounting information leads to the activate the phenomenon of insider trading in accounting information in the Iraq Stock Exchange and including a negative impact on investors' decisions ". and Because of the difficulty the discove

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Priority Based Transmission Rate Control with Neural Network Controller in WMSNs
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Engineering
Priority Based Transmission Rate Control with Neural Network Controller in WMSNs
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To

... Show More
View Publication
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF