Preferred Language
Articles
/
jRdEpY4BVTCNdQwCTFbj
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations, after the terrorist was part of the weapon. Used in the terrorist operation, other types of weapons, tools and means have entered the terrorist scene. The weapons used have allowed the implementation of operations across distances, through remote control devices, drones and other technologies that enable terrorist elements to amplify the effect of operations according to In order to reduce costs, including the costs of terrorist elements carrying out operations, and causing the greatest amount of losses and terror in the targeted community or the country.

View Publication
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
BIRDS OF CONSERVATION CONCERN AT AL-NAJAF DESERT, SOUTHERN DESERT OF IRAQ
...Show More Authors

One eighth of the bird species in the world is considered globally threatened; the avifauna of Iraq comprises 409 species and is considered as the major indicator of the health of Iraq’s biological resources. The Iraqi geography falls into five main regions among which is the desert and semi-desert areas which cover much of the country area. Al-Najaf desert is still one of the poorly known regions from the biodiversity point of view. Birds of conservation concern are detected in Al-Najaf desert during 31 field trips to 20 sites conducted from August 2018 to April 2020, (citing literature records, and personal interviews with locals).The factors caused the bird numbers to decline in Al-Najaf desert include hunting and trapping, logging,

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Control of Non Isothermal CSTR Using Different Controller Strategies
...Show More Authors

In all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FO

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Antifungal Activity of Some New Binuclear Complexes
...Show More Authors

Three complexes of copper(II) and iron(II) with mixed ligands acetylacetonebis(thio-semicarbazone)- ABTSH2 and benzaldazine- BA have been prepared and characterized using different physico-chemical techniques including the determination of metal contents, mole-cular weight, measurement of molar conductivity, magnetic moment, molar refraction, infrared and electronic spectra. Accordingly, octahedral complexes having general formulaes [Cu2(ABTSH2)2(BA)2Cl2]Cl2 and [M2(ABTSH2)2(BA)2(SO4)2] {M= Cu(II) or (Fe(II)} have been proposed. The resulted complexes screened for antifungal activity in vitro against the citrus pathogen Aspergillus niger and Fusarium sp. which caused root rot of sugar and the beans pathogen Alternaria sp. All the complex

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an Autonomous Mobile Robot using Enhanced Bacterial Foraging Optimization Algorithm
...Show More Authors

This paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Performance Evaluation of the Organic Matter Removal Efficiency in Wastewater Treatment Plants; Case study Al- Diwaniyah WWTP in Iraq
...Show More Authors

This study aims to assess the removal efficiency andestablish the BOD5 and COD statisticalcorrelation of the sewage flowing in Al-Diwaniyah wastewater treatment plant in Iraq during the study period (2005-2016). The strength of the influent wastewater entering the plant varied from medium to high in strength. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate evaluation of liquid waste and optimal control process. The equations

... Show More
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
The dispersion in spherical statistical optical potential (SOM) from the interaction of fast neutrons with197Au nucle
...Show More Authors

A statistical optical potential has been used to analyze and
evaluate the neutron interaction with heavy nuclei 197Au at the
neutron energy range (1-20 MeV). Empirical formulae of the optical
potentials parameters are predicted by using ABAREX Code with
minimize accuracy compared with experimental bench work data.
The total elastic, absorption, shape elastic and total compound crosssections are calculated for different target nuclei and different
incident neutron energies to predict the appropriate optical
parameters that suit the present interaction. Also the dispersion
relation linking between real and imaginary potential is analyzed
with more accuracy. The results indicate the behavior of the
dispersion c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Lossless Compression of Medical Images using Multiresolution Polynomial Approximation Model
...Show More Authors

In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.

View Publication
Crossref (4)
Crossref