Preferred Language
Articles
/
joe-1467
Controlling the Salt Wedge Intrusion in Shatt Al-Arab River by a Barrage
...Show More Authors

Shatt Al-Arab River in Al Basrah, Iraq, has recently recorded massive levels of TDS values (Total Dissolved Solids) in the water as a result of reduced fresh water discharge from sources, causing the river to become salinized due to salt wedge intrusion. Therefore, a block dam in the south reach is required to salt intrusion prevention. The main objective of this research is to simulate the hydraulic impact of a suggested barrage in Ras Al Besha on the Shatt Al-Arab River. The HEC-RAS (5.0.7) model was used to develop a one-dimensional unsteady model to gaining an understanding of the proposed barrage's influence on river behaviour. The daily discharges of the Tigris River provided as the upstream boundary conditions, while the hourly water levels of the Shatt Al-Arab River provided as the downstream boundary conditions. The model was initially run on the basis of daily discharges in Aug 2018 and March 2020 for the model's calibration and verification. Then, a model was run with a proposed barrage, Four cases of discharge were chosen which were the low and moderate discharge that equal to (20-50-100 and 250) m3/s with adopted spring tide cycle. The operation scenarios were examined under the influence of three cases of barrage gates (fully opened, 50% open and programmed opening). The results indicate that the investigated discharges will cause a significant problems in navigation depths, especially in the case of the programming of gates opening where the stages drop range between 2.01-3.3m comparing with the normal case. Furthermore, the velocity indicators show that the significant reduction in velocity upstream the barrage led to more sedimentation in the river reach.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Treatment of Al-Muthanna Petroleum Refinery Wastewater by Electrocoagulation Using a Tubular batch Electrochemical Reactor
...Show More Authors
Abstract<p>An electrocoagulation process has been used to eliminate the chemical oxygen demand (COD) from wastewaters discharged from the Al-Muthanna petroleum refinery plant. In this process, a circular aluminum bar was used as a sacrificial anode, and hallow cylinder made from stainless steel was used as a cathode in a tubular batch electrochemical Reactor. Impacts of the operating factors like current density (5-25mAcm<sup>-2</sup>), NaCl addition at concentrations (0-2g/l), and pH at values (3-11) on the COD removal efficiency were studied.</p><p>Results revealed that the increase in current density increases the COD removal efficiency, whereas an increase</p> ... Show More
View Publication
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Investigating the Factors that Affect the Oral Classroom Participation of Arab Postgraduate Students
...Show More Authors

This study examines the factors that affect oral participation of six Arab postgraduate students (two Iraqis, two Jordanians, and two Libyans), namely, three male participants and three female participants. For this purpose, a semi-structured interview was employed. The results showed that female as well male interviewees share some factors that make oral participation in classroom disheartening. These factors include high levels of anxiety, lack of confidence, shyness, and lack of preparation. It was also that there is no difference between male and female interviewees in relation to the factors that make them feel disheartened from oral classroom participation.

View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Sep 30 2015
Journal Name
مجلة آداب ذي قار
Spatial variation of the population illiterate in the Arab world for the period 1990 - 2009
...Show More Authors

سلمان، ندى نجيب. 2015. التباين المكاني السكان الأميين في الوطن العربي للمدة 1990-2009. مجلة آداب ذي قار،مج. 4، ع. 15، ص ص. 101-126.

View Publication
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Fri Oct 31 2025
Journal Name
The Iraqi Geological Journal
Improving Carbonate Reservoir Development Decision: A Study of Controlling Factors Based on Geological and Engineering Objectives, Halfaya Oil Field
...Show More Authors

Detecting the optimum layer for well placement, which requires a diverse assortment of tools and techniques, represents a significant challenge in petroleum studies due to its critical impact on minimizing drilling costs and time. This study aims to evaluate integrated geological, petrophysical, seismic, and geomechanical data to identify the optimum zones for well placement. Three different reservoirs were analyzed to account for lateral and vertical variations in reservoir properties. The integrated data from these reservoirs provides many tools for reservoir development, especially to detect appropriate well placement zones based on evaluations of reservoir and geomechanical quality. The Mechanical Earth Model (MEM) was construct

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The impact of Arab civilization   On the first century AH
...Show More Authors

The influx of Arab Qahtani and Nizari tribes continued to the countries of Baluchistan and the Levant in pre-Islamic times until the Levant became open to the Arab-Islamic tide during the first century AH. The Islamic Orient until the early Islamic Arab Army reached the western borders of China. What we will see in the folds of the search.

View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
International Journal Of Sustainable Development And Planning
The Role of Sustainable Environmental Indicators in Urban Happiness: A Study of Al-Amir Neighborhood in Al-Najaf City, Iraq
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref