Preferred Language
Articles
/
joe-1466
Comparison of Seepage Trough Zoned Earth dam Using Improved Light-Textured Soils
...Show More Authors

Seepage through earth dams is one of the most popular causes for earth dam collapse due to internal granule movement and seepage transfer. In earthen dams, the core plays a vital function in decreasing seepage through the dam body and lowering the phreatic line. In this research, an alternative soil to the clay soil used in the dam core has been proposed by conducting multiple experiments to test the permeability of silty and sandy soil with different additives materials. Then the selected sandy soil model was used to represent the dam experimentally, employing a permeability device to measure the amount of water that seeps through the dam's body and to represent the seepage line. A numerical model was adopted using Geo-Studio software in the branch (SEEP/W)  to simulate the experimental model, examined soils with different percentages of additives, and compared the numerical and experimental results to predict the innovation model of soil. It was found that the sandy type (C) soil model has a permeability very close to that of clay soil when using 10% cement kiln dust (CKD) and 5% cement as additives. Furthermore, soil type (C) was calibrated with the core soil of HIMREEN Earth dam, which is clay soil, as well as with the core soil of HADITHA Earth dam, which is composed of dolomite. The comparison between the results of the hypothetical simulated cases and the real cases were revealed a high agreement between the two cases according to the resulted of identical phreatic (seepage) lines and the calculated amount of seepages water from these cases.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
OFDM PAPR reduction for image transmission using improved tone reservation
...Show More Authors

High peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 16 2021
Journal Name
Cognitive Computation
Deep Transfer Learning for Improved Detection of Keratoconus using Corneal Topographic Maps
...Show More Authors
Abstract <p>Clinical keratoconus (KCN) detection is a challenging and time-consuming task. In the diagnosis process, ophthalmologists must revise demographic and clinical ophthalmic examinations. The latter include slit-lamb, corneal topographic maps, and Pentacam indices (PI). We propose an Ensemble of Deep Transfer Learning (EDTL) based on corneal topographic maps. We consider four pretrained networks, SqueezeNet (SqN), AlexNet (AN), ShuffleNet (SfN), and MobileNet-v2 (MN), and fine-tune them on a dataset of KCN and normal cases, each including four topographic maps. We also consider a PI classifier. Then, our EDTL method combines the output probabilities of each of the five classifiers to obtain a decision b</p> ... Show More
View Publication
Scopus (33)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Sust Journal Of Engineering And Computer Science (jecs)
Virtual failure influence of Roseires dam on Khartoum city using HEC-RAS Hydraulic simulation modeling
...Show More Authors

Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi

... Show More
Publication Date
Thu Mar 21 2019
Journal Name
Biochemical & Cellular Archives
EVALUATION OF THE POTASSIUM AVAILABILITY IN THE SALINE SOILS USING THE THERMODYNAMIC CRITERION
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Theoretical Analysis of Seepage through Homogeneous and Non-homogeneous Saturated-Unsaturated Soil
...Show More Authors

In this research, the program SEEP / W was used to compute the value of seepage through the homogenous and non-homogeneous earth dam with known dimensions. The results show that the relationship between the seepage and water height in upstream of the dam to its length for saturated soil was nonlinear when the dam is homogenous. For the non-homogeneous dam, the relationship was linear and the amount of seepage increase with the height of water in upstream to its length. Also the quantity of seepage was calculated using the method of (Fredlund and Xing, 1994) and (Van Genuchten, 1980) when the soil is saturated – unsaturated, the results referred to that the higher value of seepage when the soil is saturated and the lowe

... Show More
View Publication Preview PDF
Crossref (10)
Crossref