Preferred Language
Articles
/
joe-1982
Reservoir Sedimentation Assessment Using Geospatial Technology: A case Study of Dukan Reservoir, Sulaimani Governorate, Kurdistan Region, Iraq
...Show More Authors

The accumulation of sediment in reservoirs poses a major challenge that impacts the storage capacity, quality of water, and efficiency of hydroelectric power generation systems. Geospatial methods, including Geographic Information Systems (GIS) and Remote Sensing (RS), were used to assess Dukan Reservoir sediment quantities. Satellite and reservoir water level data from 2010 to 2022 were used for sedimentation assessment. The satellite data was used to analyze the water spread area, employing the Normalized Difference Water Index (NDWI) and Modified Normalized Difference Water Index (MNDWI) to enhance the water surface in the satellite imagery of Dukan Reservoir. The cone formula was employed to calculate the live storage capacity of the reservoir within two elevations. According to the study results, the live storage capacity of Dukan Reservoir at elevation 511.78 m had decreased from 8000 MCM to 7007.77MCM and 6923.53 MCM using NDWI and MNDWI respectively, due to sedimentation, resulting in a capacity loss of 14.59% and 15.83% for NDWI and MNDWI respectively.  The annual sedimentation was 13.78 MCM and 14.95 MCM for NDWI and MNDWI, respectively. Joglekar's equation and Khosla's formula have demonstrated that the sedimentation rate in the Dukan reservoir exceeds the critical rate. The findings of this study will inform the development of sediment management strategies aimed at preserving the reservoir's capacity.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative Assessment of in Vitro Effect of Three Fluoride Releasing Agents on Enamel Demineralization around Orthodontic Brackets
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Ultrasound assessment of normal splenic length and spleen to left kidney ratio in sample of Iraqi population
...Show More Authors

Background: Spleen is a hemopoietic organ which is capable of supporting elements of different systems. It is affected by several groups of diseases; inflammatory, hematopoietic, reticuloendothelial proliferation, portal hypertension and storage diseases. Ultrasound (US) may detect mild splenomegaly before it is clinically palpable. Knowledge of the normal range of spleen size in the population being examined is a prerequisite. Racial differences in splenic length could result in incorrect interpretation of splenic measurements and such differences would make it difficult to standardize expected splenic length and to determine non- palpable splenic enlargement.Objectives: To measure the normal values of splenic lengthin Iraqi subjects an

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Journal Of Global Pharma Technology
Effect of Citric Acid Application on Anatomical and Physiological Properties of the Vegetative Parts of a Species of Tamarindus Indica Cultivated in Iraq
...Show More Authors

Publication Date
Wed Jan 31 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad (jfacmed Baghdad)
The Role of Activin A levels, Body Mass Index and Beta-Human Chorionic Gonadotropin in Ectopic Pregnancies and Missed Abortions – A Study on a Group of Iraqi Women
...Show More Authors

Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Trajectory Tracking Control for a Wheeled Mobile Robot Using Fractional Order PIaDb Controller
...Show More Authors

Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order  PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to  torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
International Journal Of Ambient Energy
Energy generation by membraneless microfluidic fuel cell using acidic wastewater as a fuel
...Show More Authors

A simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref