Preferred Language
Articles
/
joe-1466
Comparison of Seepage Trough Zoned Earth dam Using Improved Light-Textured Soils
...Show More Authors

Seepage through earth dams is one of the most popular causes for earth dam collapse due to internal granule movement and seepage transfer. In earthen dams, the core plays a vital function in decreasing seepage through the dam body and lowering the phreatic line. In this research, an alternative soil to the clay soil used in the dam core has been proposed by conducting multiple experiments to test the permeability of silty and sandy soil with different additives materials. Then the selected sandy soil model was used to represent the dam experimentally, employing a permeability device to measure the amount of water that seeps through the dam's body and to represent the seepage line. A numerical model was adopted using Geo-Studio software in the branch (SEEP/W)  to simulate the experimental model, examined soils with different percentages of additives, and compared the numerical and experimental results to predict the innovation model of soil. It was found that the sandy type (C) soil model has a permeability very close to that of clay soil when using 10% cement kiln dust (CKD) and 5% cement as additives. Furthermore, soil type (C) was calibrated with the core soil of HIMREEN Earth dam, which is clay soil, as well as with the core soil of HADITHA Earth dam, which is composed of dolomite. The comparison between the results of the hypothetical simulated cases and the real cases were revealed a high agreement between the two cases according to the resulted of identical phreatic (seepage) lines and the calculated amount of seepages water from these cases.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 05 2019
Journal Name
Journal Of Engineering And Applied Sciences
Secure Image Steganography using Biorthogonal Wavelet Transform
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Jurnal Teknologi
HEAT TRANSFER ENHANCEMENT USING PASSIVE TECHNIQUE: REVIEW
...Show More Authors

Preserving and saving energy have never been more important, thus the requirement for more effective and efficient heat exchangers has never been more important. However, in order to pave the way for the proposal of a truly efficient technique, there is a need to understand the shortcomings and strengths of various aspects of heat transfer techniques. This review aims to systematically identify these characteristics two of the most popular passive heat transfer techniques: nanofluids and helically coiled tubes. The review indicated that nanoparticles improve thermal conductivity of base fluid and that the nanoparticle size, as well as the concentrations of the nanoparticles plays a major role in the effectiveness of the nanofluids.

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Iraqi Journal Of Physics
Psoriasis Treatment by Using Narrowband-UVB Phototherapy
...Show More Authors

Ultraviolet light radiation is applied to treat Plaque Psoriasis disease by targeted phototherapy. This is available through Narrowband-UVB light radiation devices peaked at wavelength 311 nm. Ten cases were chosen as a study group, 8 males aged 22-40 years old, and 2 females aged 25 and 32 years old who were exposed to ultraviolet light radiation. Their recovery or improvement was followed weekly. Different doses were used according to the severity of the lesion and as a trial for the outcome. The dose was given two times a week, starting with 200mJ/cm2, and subsequently increased by 100 or 200 mJ/cm2 reaching a maximum dose as tolerated by each individual patient. Improvement was observed after 4 – 6 weeks. The

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression using Hierarchal Linear Polynomial Coding
...Show More Authors

Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref