Preferred Language
Articles
/
jnhm-469
MONITORING OF THE WILD MAMMAL FAUNA IN BAMO MOUNTAIN IN NORTHERN IRAQ (KURDISTAN) FOR THE FIRST TIME USING CAMERA TRAP METHOD AND RAISING AWARENESS FOR ITS CONSERVATION
...Show More Authors

Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by local extinction due to poaching and wildlife trafficking, minefields, and annual fires.
In this study, a total of eight species of wild mammals were recorded for the first time in Bamo Mountain using camera trap method including the Persian leopard Panthera pardus saxicolor Pocock, 1927, and the Wild goat Capra aegagrus Erxleben, 1777, flagship and key species of conservation concern. As far as it is concerned, the major threats on the wild mammals were discussed and some important points were highlighted towards the establishment of the protected area in Bamo Mountain.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Wed May 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fixed Point Theorem for Uncommuting Mappings
...Show More Authors

   In this paper we prove a theorem about the existence and uniqueness common fixed point for two uncommenting self-mappings which defined on orbitally complete G-metric space. Where we use a general contraction condition.
 

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Mar 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Computer Aided Design for Spray Driers
...Show More Authors

The aim of this work is to develop an axi-symmetric two dimensional model based on a coupled simplified computational fluid dynamics (CFD) and Lagrangian method to predict the air flow patterns and drying of particles.  Then using this predictive tool to design more efficient spray dryers. The approach to this is to model what particles experience in the drying chamber with respect to air temperature and humidity. These histories can be obtained by combining the particles trajectories with the air temperature/humidity pattern in the spray dryer. Results are presented and discussed in terms of the air velocity, temperature, and humidity profiles within the chambers and compared for drying of a 42.5% solids solution in a spray chamber

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation
...Show More Authors

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Technique for Solving Autonomous Equations
...Show More Authors

This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition.  This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Oct 19 2021
Journal Name
Big Data Summit 2: Hpc & Ai Empowering Data Analytics 2018 | Conference Paper
Deep Bayesian for Opinion-target identification
...Show More Authors

The use of deep learning.

View Publication
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF