This study has dealt with, the issue of classification of rural road network , in addition to prepare a suggested for the classification for this network in Iraq , this classification account , the specifications and characteristics of rural roads, population, and the range taking of settlements , then this classification was applied on the rural road network in the Najaf province there are four categories of classification ,the first is major arterial rural roads divided into two major arterial and minor arterial roads , while the second category collected roads which was divided into minor arterial roads and main collected roads. The third category was represented by Local Roads , it has been divided into paved roads and unpaved, the fourth category was represented by special roads that lead certain service.
In the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid
... Show MoreLung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show MoreThis study compared and classified of land use and land cover changes by using Remote Sensing (RS) and Geographic Information Systems (GIS) on two cities (Al-Saydiya city and Al-Hurriya) in Baghdad province, capital of Iraq. In this study, Landsat satellite image for 2020 were used for (Land Use/Land Cover) classification. The change in the size of the surface area of each class in the Al-Saydiya city and Al-Hurriya cities was also calculated to estimate their effect on environment. The major change identified, in the study, was in agricultural area in Al-Saydiya city compare with Al-Hurriya city in Baghdad province. The results of the research showed that the percentage of the green
This research examines the issue of Internet banking services and their impact on customer's perceived value to know the potential of Iraqi commercial Banks to provide Internet banking services as well as determine the customer's level of perception of the value of such services. The research aims to demonstrate the effect that Internet banking services have on the customer's perceived value and to find how online banking services can be used to add value that the customer perceive. The main findings were that research sample banks don't have a sophisticated network of electronic Windows through which banking services are provided to allow customers to manage their accounts, and perform various operational operations through the
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreBacterial contamination of AL-Habania and AL-Tharthar reservoirs were studied during the period from February 2001 to January 2002, samples were collected from four stations in AL-Habania reservoir (AL-Warrar, AL-Theban regulator, middle of the reservoir and the fourth was towards AL-Razzaza reservoir) and from two stations at AL-Tharthar reservoir (Ein AL-Hilwa and the middle of the reservoir). Coliform bacteria, faecal Coliforms, Streptococci, faecal Streptococci and total count of bacteria were used as parameters of bacterial contamination in waters of both reservoirs through calculating the most probable number. Highest count of Coliform bacteria (15000 cell/100ml) was recorded at Ein AL-Hilwa and lowest count at AL-Theban regulator
... Show Morewords of God the Quranic text , is genera words have many faces and connotations a ccording to references, cutures and Ages.That the Quranic text is fixed , But the connotations are moveable the scientists agreed about the miracle of the Qurantic text , But they differd of the Position of miracLe including the muatazala and Al- Ashaira who have adopted the idea of sytem and miracle of linguistic . Most of them were lingustics, grammerians and writers as: AL- Jahith, AL- Faraa Abivbeida , Ibn kutaba , AL -Rumani , AL -katabi , AL- Bakilaai , AL- Gargani and Others.
They also differed in what the words of Allaah mean . Is the Quranic text creature or updated ,it is the issue that exhausted the effort.of muslim scientists though its imbo
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreAsset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show More