Shatt Al-Arab River in Al Basrah, Iraq, has recently recorded massive levels of TDS values (Total Dissolved Solids) in the water as a result of reduced fresh water discharge from sources, causing the river to become salinized due to salt wedge intrusion. Therefore, a block dam in the south reach is required to salt intrusion prevention. The main objective of this research is to simulate the hydraulic impact of a suggested barrage in Ras Al Besha on the Shatt Al-Arab River. The HEC-RAS (5.0.7) model was used to develop a one-dimensional unsteady model to gaining an understanding of the proposed barrage's influence on river behaviour. The daily discharges of the Tigris River provided as the upstream boundary conditions, while the hourly water levels of the Shatt Al-Arab River provided as the downstream boundary conditions. The model was initially run on the basis of daily discharges in Aug 2018 and March 2020 for the model's calibration and verification. Then, a model was run with a proposed barrage, Four cases of discharge were chosen which were the low and moderate discharge that equal to (20-50-100 and 250) m3/s with adopted spring tide cycle. The operation scenarios were examined under the influence of three cases of barrage gates (fully opened, 50% open and programmed opening). The results indicate that the investigated discharges will cause a significant problems in navigation depths, especially in the case of the programming of gates opening where the stages drop range between 2.01-3.3m comparing with the normal case. Furthermore, the velocity indicators show that the significant reduction in velocity upstream the barrage led to more sedimentation in the river reach.
This study deals with the processing of field seismic data for a seismic line located within the administrative boundaries of Najaf and Muthanna governorates in southern Iraq (7Gn 21) with a length of 54 km. The study was conducted within the Processing Department of the Oil Exploration Company using the Omega system, which contains a large number of programs that deal with processing, through the use of these programs applied predictive deconvolution of both( gap) and (spike). The final section was produced for both types. The gap predictive deconvolution gave improvement in the shallow reflectors while in deep reflectors it did not give a good improvement, thus giving a good continuity of the reflectors at
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreThe purpose of this study is to investigate the effect of credit risk indicators on the Arab Gulf countries' banks Profitability over the period of 2015 to 2017. The banking credit risk was calculated using non-performing loans ratio affecting banks profitability indicators like net income and by using fixed effect and random effect model analyses, the study found that increasing in non-performing loans ratio will decrease the net income in gulf banks, the study also found that personal loans represent the largest share of loans granted in gulf banks. Also, the study recommends the importance of developing the capabilities of credit departments in commercial banks in dealing with bad loans, and studying the financial statem
... Show MoreThe poly(ethylene oxide) polymer (PEO) is doped with fine powder of MnCl2 salt and thin films of thickness (50–150 mm) with salt content (0, 5, 10, 15, and 20 wt%) are obtained. The AC electrical conductivity and dielectric constants are studied as a function of temperature through an impedance technique. It is found that AC conductivity increases and the calculated activation energy decreases with increasing temperature due to enhancement of the ionic conduction in the film bulk. The dielectric constants of the doped membranes increase with temperature. It is found that the peak value of the tanloss is shifted to a higher frequency at higher temperatures. The dielectric behavior is explained on the basis of
... Show MoreThis qualitative study was conducted on eight types of commercial baking yeast which available in local markets to estimate their fermentation activity as affecting the Bread industry and the impact of the salt added to DoughLeavening, The results showed a great variation in the fermentation capacity of yeast samples (their role in swelling the dough), most notably the sample value Y3 and least sample Y7 and reached 80% and 20% respectively, and the value of Leavening by using the two types of yeast with addition of three levels of salt (0 , 1 and 2%) have 20.0 , 19.7 and 15.7 of the sample Y3, compared with 10.5 , 10.3 and 8.8 of the sample Y7 for each of the levels of salt respectively, reflect
... Show MoreThe current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More