Preferred Language
Articles
/
jnhm-469
MONITORING OF THE WILD MAMMAL FAUNA IN BAMO MOUNTAIN IN NORTHERN IRAQ (KURDISTAN) FOR THE FIRST TIME USING CAMERA TRAP METHOD AND RAISING AWARENESS FOR ITS CONSERVATION
...Show More Authors

Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by local extinction due to poaching and wildlife trafficking, minefields, and annual fires.
In this study, a total of eight species of wild mammals were recorded for the first time in Bamo Mountain using camera trap method including the Persian leopard Panthera pardus saxicolor Pocock, 1927, and the Wild goat Capra aegagrus Erxleben, 1777, flagship and key species of conservation concern. As far as it is concerned, the major threats on the wild mammals were discussed and some important points were highlighted towards the establishment of the protected area in Bamo Mountain.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)
...Show More Authors

 

   The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units.

Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) an

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Effect gold nanoparticles generated by cold plasma for mineral blood
...Show More Authors

In the present study, gold nanoparticles (AuNPs) were prepared using a simple low cost method synthesized cold plasma at different exposure time . The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AuNPs showed surface Plasmon resonance centered at 530, 540,and 533 nm. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of gold nanoparticles for all samples were prepared .The average crystallite size of the AuNPs was 20-40 nm. Morphology of the AuNPs were carried out using FESEM. Observations show that the AuNPs synthesized we well dispersed with and particle sizes ranging from 9 to 31 nm with spherical shapes which are cle

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
Al-nahrain Journal Of Science
THREE DIMENSIONAL EXPLICIT MODEL FOR COMETARY TAIL IONSINTERACTIONSWITH SOLAR WIND
...Show More Authors

The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Indian Journal Of Pure & Applied Physics
Diferuloymethane anchored anatase TiO2 nanoparticle for dye sensitized solar cell
...Show More Authors

Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of University Of Babylon For Engineering Sciences
Introduction to Methods for Simulating Urban Heat Islands: Subject Review
...Show More Authors

Urbanization led to significant changes in the properties of the land surface. That appends additional heat loads at the city, which threaten comfort and health of people. There is unclear understanding represent of the relationship between climate indicators and the features of the early virtual urban design. The research focused on simulation capability, and the affect in urban microclimate. It is assumed that the adoption of certain scenarios and strategies to mitigate the intensity of the UHI leads to the improvement of the local climate and reduce the impact of global warming. The aim is to show on the UHI methods simulation and the programs that supporting simulation and mitigate the effect UHI. UHI reviewed has been conducted the for

... Show More
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Thu May 01 2008
Journal Name
2008 International Conference On Computer And Communication Engineering
A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref