Preferred Language
Articles
/
ijp-1077
Design and Construction of a Dust Detection System using Infrared Laser: The Case of Dust Storms in Baghdad in the Summer 2022
...Show More Authors

Iraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.

The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, which were detected using a digital storage oscilloscope.

These studies were conducted during the dust storms that occurred intensely in Baghdad in the months (April, May, June and July) of the year 2022. Where multiple samples were taken at different periods in these storms, measurements were also done during the storm. The types of polluting elements found in the dust of the storms are: carbon, bromine, chlorine, hydrocarbons alcohol, ether, hydroxyl group, carbon, C=C (aromatic ring), nitrogen dioxide (aromatic nitro), and carbon monoxide. The value ​​of dust pollutant concentrations is (125.67 mg. m-3).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Building a model to reduce the cost of hajj in the Iraqi Authority for Hajj and Umrah
...Show More Authors

The research is summarized in the construction of a mathematical model using the most common methods in the science of Operations Research, which are the models of transportation and linear programming to find the best solution to the problem of the high cost of hajj in Iraq, and this is done by reaching the optimum number of pilgrims traveling through both land ports and the number Ideal for passengers traveling through airports by Iraqi Airways, instead of relying on the personal experience of the decision-maker in Hajj and Umrah Authority by identifying the best port for pilgrim's travel, which can tolerate right or wrong, has been based on scientific methods of Operations Research, the researcher built two mathematical models

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The economic implications of the housing problem In Iraq and ways to address it - a theoretical research
...Show More Authors

The problem of housing in Iraq is a long-rooted and rooted problem, and it needs a great effort to find out its causes and thus give essential points that contribute to alleviating and addressing it, and it is worth noting that research into the housing problem and the housing sector in Iraq is not done in isolation from other sectors and studies. As well as the economic policies pursued and the social and political conditions. It is known that the Iraqi economy is a unilateral (rentier) economy, that is, it depends almost entirely on exporting oil and obtaining revenues, and that the economic decision and economic policies followed in Iraq are greatly affected by several factors, including the economic, social and political fact

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
The semiology of culture and the sign variable in a theatre performance: Iraqi theatre as an example
...Show More Authors

The culture of theatre performance has a vital role in the process of reading the linguistic and visual signs of the performance. And the process of transforming a theatre performance from its original context into a new hosting cultural context starts from the actual reading of the text. Directors derives their new signs out of his personal culture, depending on the society where they lives and the culture that forms the social conventions, traditions and beliefs. The text is usually written within its own historical and temporal culture. The process of its production usually takes it away from its original culture, when it interprets the codes of the original writer and their visual and linguistic signs and instils new alternative sign

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 25 2024
Journal Name
Heritage And Sustainable Development
Job burnout and its relationship to achieving competitive superiority among the employees of the University of Baghdad
...Show More Authors

This research focuses on the epidemic of Job burnout and seeks to achieve sustainable preeminence among the employees of the University of Baghdad. It also identifies the meaning of the differences between the two genders of males and females according to the variables, and it also does the correlation between the two variables. First, the two researchers developed a test of job burnout that incorporates 18 items, which has been proven to be statistically fit. Moreover, they developed a competitive superiority measure consisting of 22 items in it, and its psychometric properties confirm their fit. The two tools were applied to a sample of 120 employees who were randomly selected from six colleges at the University of Baghdad, alongside univ

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the cleaning efficiency of the isthmus using different rotary instrumentation techniques (In vitro study)
...Show More Authors

Background: The aims of the study were to evaluate the unclean/clean root canal surface areas with a histopathological cross section view of the root canal and the isthmus and to evaluate the efficiency of instrumentation to the isthmus using different rotary instrumentation techniques. Materials and Methods:The mesial roots of thirty human mandibular molars were divided into six groups, each group was composed of five roots (10 root canals)which prepared and irrigated as: Group one A: Protaper system to size F2 and hypodermic syringe, Group one B: Protaper system to size F2 and endoactivator system, Group two A:Wave One small then primary file and hypodermic syringe, Group two B:Wave One small then primary file and endoactivator system, Gr

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Iraqi Geological Journal
Use Conventional and Statistical Methods for Porosity Estimating in Carbonate Reservoir in Southern Iraq, Case Study
...Show More Authors

Porosity is important because it reflects the presence of oil reserves. Hence, the number of underground reserves and a direct influence on the essential petrophysical parameters, such as permeability and saturation, are related to connected pores. Also, the selection of perforation interval and recommended drilling additional infill wells. For the estimation two distinct methods are used to obtain the results: the first method is based on conventional equations that utilize porosity logs. In contrast, the second approach relies on statistical methods based on making matrices dependent on rock and fluid composition and solving the equations (matrices) instantaneously. In which records have entered as equations, and the matrix is sol

... Show More
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Gas Lifting Design in Mishrif Formation of Halfaya Oil Field
...Show More Authors

The optimization of artificial gas lift techniques plays a crucial role in the advancement of oil field development. This study focuses on investigating the impact of gas lift design and optimization on production outcomes within the Mishrif formation of the Halfaya oil field. A comprehensive production network nodal analysis model was formulated using a PIPESIM Optimizer-based Genetic Algorithm and meticulously calibrated utilizing field-collected data from a network comprising seven wells. This well group encompasses three directional wells currently employing gas lift and four naturally producing vertical wells. To augment productivity and optimize network performance, a novel gas lift design strategy was proposed. The optimization of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Job Enrichment in Building Differentiation Strategy Service: Analytical Exploratory Study of the Views of a Sample of the General Managers and Heads of Departments and Officials of the People in the General Establishment of Civil Aviation
...Show More Authors

According to the importance of the subject of research, and the importance of the surveyed organization as a dynamic sector of the country in general , The research attempts to suggest to service organizations in general reconsidering the currently adopted mechanisms in the redesign of its functions , and in the services provided industry . The data was collected from (98) Director Mangers , head of department and head of division . The research tool is the questionnaire , which included (50) items . The results show Significant Effect & Correlation relationship between the two variables due to their dimensions . These lead to he application of job enrichment technology will increase the organization's ability to possess efficient hu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref