Preferred Language
Articles
/
joe-1706
A Control Program for Hydropower Operation Based on Minimizing the Principal Stress Values on the Dam Body: Mosul Dam Case Study
...Show More Authors

This study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed to the dam's turbine-shared zone. The maximal and minimal upstream reservoir water levels were investigated. A control program was created depending on the principle stress model results collected from the operation of the hydropower plant with the minimum principal stress on the dam body. This research suggests an enhanced turbine operating system, reducing stress on the dam body and increasing dam operation life.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Engineering
USING FUZZY LOGIC CONTROLLER FOR A TWO- TANK LEVEL CONTROL SYSTEM
...Show More Authors

This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.

Publication Date
Thu Dec 01 2016
Journal Name
2016 Ieee Symposium Series On Computational Intelligence (ssci)
A fusion of time-domain descriptors for improved myoelectric hand control
...Show More Authors

View Publication
Scopus (38)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Mon Dec 21 2015
Journal Name
Al-mustansiriyah Journal Of Science
A comparative Study of Adiponectin and Oxidative Stress (malondialdehyde and peroxynitrite) levels in Iraqi Patients with Acromegaly
...Show More Authors

The aim of this study is to find a relationship between oxidative stress and adiponectin in Iraqi patients with acromegaly. The present study included 30 patients with acromegaly disease attending at Al-Yarmuk teaching hospital , and 30 healthy individuals as a control group.The two groups with ages ranging (30-55) years. The results revealed a highly significant elevation in all parameters (GH,IGF-1 , adiponectin , malondialdehyde , and peroxynitrite ) levels in sera of patients when compared with healthy control .It can be concluded that oxidative stress (malondialdehyde and peroxynitrite ) may be valuable in detecting of endocrine diseases like acromegaly .

Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating The Performance of Public Companies in The Light of Financial Indicators Case study of the General Company for Drugs and Medical Supplies/ Samarra – Iraq For the period (2014-2019)
...Show More Authors

 

The research aimed to evaluate the financial performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq to know the strengths and weaknesses that affect its performance, as well as to compare its performance in the years between (2017-2019), which are characterized by security stability with its performance in previous years (2014 -2016) which is characterized by security instability, to assess the extent of its ability to achieve growth in performance, by answering the main question, what is the evaluation of the performance of the Public Company for the manufacture of medicines and medical supplies / Samarra - Iraq in the light of financial indicators?

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
The Dominant Values of Universities students in the light of some variables
...Show More Authors

Current research strives to achieve the following aims:

  1. Develop a scale for dominant values of Tikrit university students.
  2. Measuring the dominant of Tikrit university students.
  3. Identifying the significant differences among dominant values of Tikrit university students according to(sex, specialty, time).
  4. Measuring the dominant values of each one of the six fields of the scale.
  5. Identifying the differences in dominant values of each field according to the sex variables.

The current research has limi

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Instruction Program on Teachers’ Performance of Counseling for Primary School Pupils regarding Attention Deficit and Hyperactivity Disorder
...Show More Authors

Objective(s): To evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, to identify the relationship between Teachers’ Performance of Counselling for Pupils with Attention Deficit and Hyperactivity Disorder and their demographic.

Methodology: A quasi-experimental (pre-posttest) design was carried out to evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, at Al-Firdous mixed primary School and to find out the association between teachers' performance about Attention Deficit and Hyperactivity Disorder and their socio-demographic characteristic. The study was started from 18th September 2

... Show More
View Publication Preview PDF
Crossref