Preferred Language
Articles
/
ijs-7068
Suspended Sediment Concentration and Stream Discharge Relationship During Storm Events in Tributaries of Smaquli Stream, Erbil, Iraq
...Show More Authors

The primary objective of this study is to monitor and collect data from the main
tributaries of Smaquli stream during rainfall storm events, which can be used to
establish relationship between suspended sediment concentration and discharge. The
Smaquli catchment is divided into two sub-catchments namely Sarwchawa and
Krosh with areas of 80.64 and 34.82 km2 respectively. Jali dam is built at watershed
outlet. Rainfall, stream discharge, and suspended sediment concentration are
monitored during ten rainfall storms in the water years (2012-2013) and (2013-
2014). Analysis of the data from the two sampling sites, shows two different
responses of suspended sediment concentrations. The Krosh sub-catchment reacts
rapidly to rainfall storms and the same behavior is shown in the suspended sediment
that is resulted seven single and three double-peaked graphs. On the other hand, the
reaction of Sarwchawa sub-catchment was slower. Moreover, analysis of cumulative
flow and suspended sediment showed the Krosh sub-catchment ranks almost equally
as one of the flow and sediment contributors to the Smaquli stream, in spite of the
area difference between Sarwchawa and Krosh sub-catchments. The peak stream
flows are highly correlated with total and peak suspended sediments at Krosh station
having correlation coefficients of (R=0.96 and 0.84) respectively. In contrast, at
Sarwchawa sub-catchment, the peak stream flow was weakly correlated with peak
suspended sediment (R=0.47). To reduce sedimentation, this study suggests
changing the land use practices for example types of crops and frequent planting and
less grazing of sheep and goats.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluation of Heavy Metals Concentration in Street, Storm and Suspended Dust in Al-Zafaraniya Area, Baghdad- Iraq
...Show More Authors

The current study was applied in Al-Zafaraniya area southeast of the capital Baghdad from October 2021 to April 2022. This is to evaluate some heavy elements (Cd, Co, Cu, Fe, Pb, and Mn) in the street, storm, and suspended dust. Four sampling sites were selected, and codes A, B, C, and D were given to represent the industrial activity sites, service workshops, business activity, and residential areas.

        The results showed that the concentration rates of elements (Cd, Co, Cu, Fe, Pb, Mn) in street dust samples were (1.15, 6.6, 60.15, 26770, 44.4, 6, 489.8). In storm dust (2, 10, 49.3, 54760, 24.3, 827.2) ppm, respectively, the results of suspended dust revealed that the general rates of element concentrations were (0.7

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Robust and Efficient Dynamic Stream Cipher Cryptosystem
...Show More Authors

In this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.

We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.

View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Relation Ship and Effect Of Jet Stream in Anti-Ciyclone in Influencing The Climate Of Iraq
...Show More Authors

This study aimed to statement jet stream and its impact in the anti-cyclone affecting the climate of Iraq. Through the use of simple correlation coefficient ( Pearson ) that there is a very strong relationship between high- Siberian and both of the jet stream especially during the winter or over the stations of North . Therefore we, observe the relationship be significant in most of the winter months , spring and autumn . Statistically significant , but are different between station and another station , while the study come to another Anti-ciyclon have a real ,significant and statistically relationship corrclation . But this relationship is less than which found in are much less it with the Siberian high , it depends on the type of stat

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Stream of Consciousness Technique: Psychological Perspectives and Use in Modern Novel
...Show More Authors

Stream of Consciousness technique has a great impact on writing literary texts in the modern age. This technique was broadly used in the late of nineteen century as a result of thedecay of plot, especially in novel writing. Novelists began to use stream of consciousness technique as a new phenomenon, because it goes deeper into the human mind and soul through involving it in writing. Modern novel has changed after Victorian age from the traditional novel that considers themes of religion, culture, social matters, etc.  to be a group of irregular events and thoughts interrogate or reveal the inner feeling of  readers.

This study simplifies stream of consciousness technique through clarifying the three levels of conscious

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Civil Engineering Journal
Effect of Vehicular Stream Characteristics on Traffic Noise
...Show More Authors

Human health can be negatively impacted by exposure to loud noise, which can harm the auditory system. Traffic noise is the leading cause of noise pollution. This paper studies the problem of noise pollution on the roads in Baghdad, Iraq. Due to the increase in vehicle numbers and road network modifications in Baghdad, noise levels became a serious topic to be studied. The aim of the paper was thus to study traffic noise levels and the effect of the traffic stream on noise levels and to formulate a prediction model that identified the guidelines used for designing or developing future roads in the city. Then, the noise levels were measured based on five variables: the functional classification of roads, traffic flow, vehicle speed,

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF