Preferred Language
Articles
/
joe-1044
The Effect of Diyala River Water Quality on the Quality of Tigris River Water using GIS Mapping
...Show More Authors

The assessment of a river water’ quality is an essential procedure of monitor programs and is used to collect basic environmental data. The management of integrated water resources in a sustainable method is also necessary to allow future generations to meet their water needs. The main objective of this research is to assess the effect of the Diyala River on Tigris River water quality using Geographic Information System (GIS) technique. Water samples have been collected monthly from November 2017 to April 2018 from four selected locations in Tigris and Diyala Rivers using the grab sampling method. Fourteen parameters were studied which are Turbidity, pH, Dissolved Oxygen, Biological Oxygen Demand, Electrical Conductivity, Total Dissolved Solids, Total Hardness, Calcium, Magnesium, Chloride, Sulphate, Phosphate, Sodium, and Total Alkalinity. The results of GIS maps showed that the water quality of the Tigris River nearly affected by the water quality of the Diyala River within the locations selected. The maps also reveal that in March and April 2018 the quality of surface water got a sudden peak compared with the other months. This is due to the increase in both the parameter of Turbidity and Total Dissolved Solids.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Awareness of the problem technological poisoning Media of parents of kindergarten children and their teachers
...Show More Authors

The childhood stage is considered the most important stage of all the stages through
the human being’s life. In this stage the human being will be more affected by the various
factors that surround him/her. The first five years of his/her life leave a great impact not only
on the human being personality, but also on his/her whole life. Therefore, it is worthwhile tobe concerned with and focus at the raising up and the teaching of the child during the
childhood stage.
The mission of raising up children in this era - the era of globalization and information
bursting or news flooding – has become a very difficult or even an impossible mission.
Furthermore, not only in the Arabic world, but also all over the world, t

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Assessment of the Depression Level among Medical Students at University of Baghdad, College of Medicine
...Show More Authors

Background: Depression, a state of low mood and aversion to activity, can affect people's thoughts, behavior, tendencies, feelings, and sense of well-being. It can either be short-term or long-term, depending on the severity of the person's condition. Risk factors include personal or family history of depression, major life changes, trauma, stress, certain physical illnesses, and medications.

Objective: This study investigates the prevalence of depression among medical students at the University of Baghdad, college of medicine in Iraq, and the association between some variables and depression.

Subjects and Methods: A cross-sectional study design with a convenience sampling method was conducted.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Building and codifying a scale of the level of tactical performance of advanced volleyball players
...Show More Authors

The research objectives, to build a measure of the level of tactical performance of volleyball players applying for the Iraqi Premier League for the 2018-2019 season. The nature of the research problem, then the researchers determined the research sample in the deliberate manner of the players of the Iraqi clubs for the Premier League (B, A). The researchers adopted the entire community as a sample for the research, and the number (156) players distributed over (13) clubs and divided the sample into (12)players an exploratory experiment player representing (the police club) and (100) player representing the construction sample and after a maximum period of two months has passed since applying the scale to the construction sample the researc

... Show More
Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Reliability and Failure Probability Functions of the m-Consecutive-k-out-of-n: F Linear and Circular Systems
...Show More Authors

The m-consecutive-k-out-of-n: F linear and circular system consists of n sequentially connected components; the components are ordered on a line or a circle; it fails if there are at least m non-overlapping runs of consecutive-k failed components. This paper proposes the reliability and failure probability functions for both linearly and circularly m-consecutive-k-out-of-n: F systems. More precisely, the failure states of the system components are separated into two collections (the working and the failure collections); where each one is defined as a collection of finite mutual disjoint classes of the system states. Illustrative example is provided.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF