Preferred Language
Articles
/
gxeNapIBVTCNdQwCwK_L
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examination of the topological structure by choosing a few factors associated with the connection of the roads. These involved the cyclomatic number, Eta coefficient, Aggregate Transform Score (ATS), Beta, gamma, and Alpha indices. According to the findings, the Al-Adhamiya roads network is more developed, better linked, and has a higher overall connectivity value than the Al-Kadhimiya network. The two study areas, however, have minimal circuitry and high complexity. Due to the modifications and expansion of land use that the municipalities have seen, the research suggests that the transportation network should be developed to reach greater interconnectedness, particularly in locations outside the city center.

Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW HOST RECORD FOR TOMATO LEAF MINER TUTA ABSOLUTA (MEYRICK, 1917) IN BAGHDAD PROVINCE, IRAQ
...Show More Authors

  In 2010, the tomato leaf miner Tuta absoluta (Meyrick, 1917) was reported for the first time in Iraq. The larvae can feed on all parts of tomato plants and can damage all the growth stages. The main host plant is tomato, Lycopersicon esculentum, but it can also attack other plants in Solanaceae family. In this study it was found attacking alfalfa plants, Medicago sativa in Baghdad Province. This finding reveals that alfalfa also serves as a host plant for T. absoluta in Iraq.

View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Iraqi Geological Journal
Development of Artificial Intelligence Models for Estimating Rate of Penetration in East Baghdad Field, Middle Iraq
...Show More Authors

It is well known that the rate of penetration is a key function for drilling engineers since it is directly related to the final well cost, thus reducing the non-productive time is a target of interest for all oil companies by optimizing the drilling processes or drilling parameters. These drilling parameters include mechanical (RPM, WOB, flow rate, SPP, torque and hook load) and travel transit time. The big challenge prediction is the complex interconnection between the drilling parameters so artificial intelligence techniques have been conducted in this study to predict ROP using operational drilling parameters and formation characteristics. In the current study, three AI techniques have been used which are neural network, fuzzy i

... Show More
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic Agility in organizational excellence In Ministry of Construction, Housing, Municipalities and Public Works
...Show More Authors

The aim of this research is to identify the role of strategic agility achieving organizational excellence in one of the formations of the Ministry of Municipalities (Dhi Qar Sewage Directorate), as important service organizations that have a key role in serving and developing the society which faced many administrative challenges and issues and as a result of the changes in the environment is continuing and accelerating, so the adoption of modern administrative concepts such as strategic Agility and knowledge of their role in achieving organizational excellence can help them in facing these changes and achieve what they aspire to. In order to achieve research objectives, two main hypotheses have been formulated. The first hypothe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DISTINCTION BETWEEN TWO SPECIES OF THE GENUS EXOCHOMUS REDTENB. (COLEOPTERA : COCCINELLIDAE) IN IRAQ
...Show More Authors

The present paper attempts to establish a distinction between Exochomus negripennis (Er.) and E. quadripustulatus L., depending on the characters of femoral line, male genitalia and spermatheca.

View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST RECORD OF TWO PARASITOID WASPS OF THE FAMILY CHALCIDIDAE (HYMENOPTERA) IN IRAQ
...Show More Authors

The family Chalcididae (Order: Hymenoptera) is known as one of the large chalcidoid wasps with some distinct morphological characters. The first occurrence of two parasitoid species belonging to this family was reported in the Al-Husayniya district Karbala Province, Iraq; which are: Brachymeria podagrica (Fabricius, 1787) and Chalcis myrifex (Sulzer, 1776). Both species were collected by using the sweeping net from orchards during July 2020.

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Isolation, Identification, and Quantification of Two Compounds from Cassia glauca Cultivated in Iraq
...Show More Authors

The Cassia glauca Lam. is the tree that belongs to the Fabaceae family and is native to India has many uses in indigenous systems of medicine, folk medicine, and traditional Brazilian medicine. Has many pharmacological activities such as anti-diabetic, antibacterial, antifungal, antioxidant, anti-hemolytic, anticancer, cardio-protective, and Hepato-protection.  The aim of study is to Isolation, identification, and quantification of some compounds from aerial parts of Cassia glauca since no phytochemical investigation had previously been done in Iraq for this plant. The aerial parts were defatted in n. hexane for 48 hours. The defatted materials were extracted in 85% ethanol using the hot method (soxhlet), then the extract was fra

... Show More
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (11)
Crossref