Preferred Language
Articles
/
joe-1416
Evaluation and Development of the (Hilla – Daghara) Rivers System
...Show More Authors

Shatt Al-Hilla branches from the left of Euphrates River, U/S Hindiyah Barrage, Iraq, and extends about 100 km. It branches at the end into Shatt Al-Diwaniya 112 km and Shatt Al-Daghara 64 km. The study aims to evaluate and develop (Hilla-Daghara) rivers system, which is included Shatt Al-Hilla and Shatt Al-Daghara. Fieldwork began from (26 October until December) 2020. M9, S5 devices, and the installed staff gauges were used to measure discharges and water levels, respectively. A one-dimensional model was developed for the study area by HEC-RAS, after calibration and verification by field measurements; the Manning's n of Shatt Al-Daghara is found to be 0.022. Five Scenarios were simulated to study the reach under the current conditions. It was found that the discharge capacity in Shatt Al-Hilla and Shatt Al-Daghara is 200 m3/s and 50 m3/s, respectively. Four scenarios were conducted for the development to improve the capacity of Shatt Al-Hilla to 303 m3/s and Shatt Al-Daghara to 75 m3/s. Earthworks volume of development Shatt Al-Hilla and Shatt Al-Daghara are about (5.89 and 0.54) Mm³, and its cost is (11.780 and 1.080) billion IQD respectively. Results of applied development show that Shatt Al-Daghara tail can pass discharge more than five m3/s when Shatt Al-Daghara tail cross regulator that causes choking in the last reach of Shatt Al-Daghara is removed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 13 2012
Journal Name
Wireless Personal Communications
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

View Publication
Scopus (17)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Competitiveness of an enterprise under a flexible manufacturing system. Manufacturing strategy and flexibility - Case study
...Show More Authors

The research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business  strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Application of the Holonic Manufacturing System using the Genetic Algorithm : Case Study in Lab 7 of the General Company for the Leather Industry
...Show More Authors

The study aims to achieve several objectives, including follow-up scientific developments and transformations in the modern concepts of the Holistic Manufacturing System for the purpose of identifying the methods of switching to the entrances of artificial intelligence, and clarifying the mechanism of operation of the genetic algorithm under the Holonic Manufacturing System, to benefit from the advantages of systems and to achieve the maximum savings in time and cost of machines Using the Holistic Manufacturing System method and the Genetic algorithm, which allows for optimal maintenance time and minimizing the total cost, which in turn enables the workers of these machines to control the vacations in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
AXIAL FAN BEARING SYSTEM VIBRATION ANALYSIS
...Show More Authors

Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Apr 25 2019
Journal Name
Journal Of Pharmacy Research
Pulsatile drug delivery system-review article
...Show More Authors

Pulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref