Preferred Language
Articles
/
joe-1956
A Developed Model for Selecting Optimum Locations of Water Harvesting Dams Using GIS Techniques
...Show More Authors

An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In addition to that (negative) penalty items are also included such as surface area, evaporation rate.
In order to obtain precise results, an Artificial Neural Network (ANN) model was formulated and applied to correct the elevations of the Digital Elevation Model (DEM) map using real and DEM elevations of available selected control points.
The application of the model is tested using a case study of a catchment area in Diyala and Wasit Governorate. The DEM file was corrected for elevations, using the developed ANN model .This model is found using SPSS – software. The correlation coefficient of this model is found to be (0.97) , with 3- hidden nodes and hyperbolic tangent and identity activation functions. Different weight scenarios for the objective function of the optimization model were adopted. The results indicate that different optimum dam locations can be observed for each case. Results indicate also that sometimes equal objective can be obtained but each has different reservoir volume and surface area.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Modeling of Electromembrane Extraction of Copper using a Novel Electrolytic Cell Provided with a Supported Liquid Membrane
...Show More Authors

   The aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 12 2025
Journal Name
Al–bahith Al–a'alami
EMPLOYING TWITTER IN THE U.S. PRESIDENTIAL ELECTION CAMPAIGN IN 2016: U.S. PRESIDENTIAL CANDIDATE DONALD TRUMP’S TWEETS AS A “MODEL”: (A Research Drawn from a Master’s Thesis) (An Analytical Study)
...Show More Authors

This study aimed to identify the employment of the social networking platform «Twitter» in the 2016 presidential campaign led by the Republican candidate, Donald Trump; and analyse his tweets through his personal account on «Twitter»  for the period from: 10/ 8/2016 to: 11/ 8/2016 which represents the last month of the election campaign.

The study belongs to the type of descriptive studies using the analytical method through an analysis index that includes sub-categories and other secondary categories. The research has adopted the ordinary unit of information material (tweet) as an analysis unit for this purpose.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 20 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EVALUATION OF THE EFFICIENCY OF AL-WAHDA PLANT IN PURIFICATION OF POTABLE WATER: EVALUATION OF THE EFFICIENCY OF AL-WAHDA PLANT IN PURIFICATION OF POTABLE WATER
...Show More Authors

Water samples were collected from output of water for Al-Wahda plant where located in al-karrada area in Baghdad city to study water contamination with bacteria, fungi and Algae. The study lasted one year started on August, 2016 to July,2017.Results were acquired according to two tests performed, the first is biological test included total coliform,E.coli, pseudomonas aeruginosa, total fungi, Diatom and non Diatom Algae and the second is physiochemical test included temperature, turbidity and residual chlorine. The results of bacteria were within the permitted specification in the Iraqi standards no. 14/2270 for the year 2015 except August was exceeded the permitted standard for total coliform, it was 1.1< cell/100 ml.Total Fungi, Dia

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Dynamics of Predator-prey Model under Fluctuation Rescue Effect
...Show More Authors

This paper presents a novel idea as it investigates the rescue effect of the prey with fluctuation effect for the first time to propose a modified predator-prey model that forms a non-autonomous model. However, the approximation method is utilized to convert the non-autonomous model to an autonomous one by simplifying the mathematical analysis and following the dynamical behaviors. Some theoretical properties of the proposed autonomous model like the boundedness, stability, and Kolmogorov conditions are studied. This paper's analytical results demonstrate that the dynamic behaviors are globally stable and that the rescue effect improves the likelihood of coexistence compared to when there is no rescue impact. Furthermore, numerical simul

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref