Preferred Language
Articles
/
joe-1134
GIS as A Tool for Expansive Soil Detection at Sulaymaniyah City
...Show More Authors

Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6) m. A total of 1396 observations were used for producing the maps for both LL and PI, and 371 data for LI. Based on the results, the IDW method gives reasonable predictions depending on the results of R2 and RMSE. The results also showed that the study area has relatively large zones of high expansive soil that must be taken into considerations before performing any construction activity. These maps are essential for helping geotechnical engineers in making decisions and visualizing soils’ behaviors.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (21)
Crossref (4)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Clinical Evaluation of a Formulated Econazol Nitrate as A Topical Solution
...Show More Authors

Econazole nitrate (EN) is considered as the most effective agent for the treatment of all forms of dermatomycosis caused by dernatophytes. It was formulated as a topical solution in our laboratories. This study was designed to evaluate the effectiveness of Econazol Nitrate in the prepared formula and compared with that of commercial brand, Pevaryl®. A total of 104 patient suffering from dermatomycoses were involved in this investigation. Both formula were applied to the affected skin region in the morning and evening from week to 16 weeks with light massage until complete healing effect was achieved. The data revealed that the percentage of cured patient treated with the prepared formula and reference formula of Ecanozol Nitrate 1% so

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Numerical Simulation of Unsaturated Soil Water Flow from a Trickle Point System, Considering Evaporation and Root Water Uptake
...Show More Authors

This research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
In Situ Hybridization for Molecular Detection of Human Papilloma Viral 6 / 11 DNA in Adenoctomized Tissues from A group of Iraqi Pediatric Patients
...Show More Authors

Among more than 200 different human papilloma viral genotypes, the association of low oncogenic risk-HPV genotypes have been recognized with a variety of oral, oropharyngeal, nasopharyngeal benign tumors as well as non-neoplastic polyposis and papillomas and adenoid hypertrophy. This prospective case- control study aims to determine the rate of DNA detection of HPV genotype 6/11 in nasopharyngeal adeno- tonsillar tissues from a group of patients subjected to adenoctomy for adenoid hypertrophy . A total number of nasopharyngeal adeno-tonsillar tissue specimens from pediatric patients with adenoid hypertrophy were enrolled; 40 nasopharyngeal adeno-tonsillar tissues from patients with adenoid hypertrophy, and 20 normal nasal tissue specimen

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
Reduced and Citation Forms as Produced by Iraqi EFL University Students at Duhok University An Error Analytic Study
...Show More Authors

English is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.

      This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021.  The material tested is six connective words which represent the commonest ones in every-day co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 12 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Effect of food an appearance of ovaries cysts its relation with some variable factors in women at age 15-54 years in Baghdad – city: Effect of food an appearance of ovaries cysts its relation with some variable factors in women at age 15-54 years in Baghdad – city
...Show More Authors

Abstract
This study aimed to kmow the effect of food on appearance of ovaries cyst in women aged 15-54 year in Baghdad. City and its relation ship with reproductive health Woman samples was divided to four aged groups;15-24 , 25-34 , 35-44 and 45-54 years.
Results demonstrate that all samples of women has varied level of obesity.
Also we are noticed that all samples of women has varied level of obesity.
Also we are noticed tgat is a relation ship between obesity and marriagestatas with the highest proportion of ovarian cystsin obese marriage woman reached to37.90% The percent of un married women which have obesity class // with ovarian cysts reached50% Results refer to found that %19-24 of married women had obortians and

... Show More
View Publication Preview PDF