Preferred Language
Articles
/
joe-2178
Analysis of Mosul and Haditha Dam Flow Data
...Show More Authors

The expansion in water projects implementations in Turkey and Syria becomes of great concern to the workers in the field of water resources management in Iraq. Such expansion with the absence of bi-lateral agreement between the three riparian countries of Tigris and Euphrates Rivers; Turkey, Syria and Iraq, is expected to lead to a substantially reduction of water inflow to the territories of Iraq. Accordingly, this study consists of two parts: first part is aiming to study the changes of the water inflow to the territory of Iraq, at Turkey and Syria borders, from 1953 to 2009; the results indicated that the annual mean inflow in Tigris River was decreased from 677 m3/sec to 526 m3/sec, after operating Turkey reservoirs, while in the Euphrates River the annual mean inflow was decreased from 1006 m3/sec to 627m3/sec after operating Syria and Turkey reservoirs. Second part is forecasting the monthly inflow and the water demand under the reduced inflow data. The results show that the future inflow of the Tigris River is expected to decrease to 57%, and reaches 301m3/sec. The Mosul reservoir will be able to supply 64% only of the water requirements to the downstream. The share of Iraq from the inflow of the Euphrates River is expected to be 58%, therefore the future inflow will reach 290 m3/sec. The Haditha reservoir will be able to supply 46% only of the water requirements to the downstream, due to reduced inflow at Iraqi border in the future.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue May 20 2008
Journal Name
Journal Of Planner And Development
Estimating Water Quality from Satellite Image and Reflectance Data
...Show More Authors

The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Simulation and Experimental Investigation of Performance and Flow Behavior for Steam Ejector Refrigeration System
...Show More Authors

The ejector refrigeration system is a desirable choice to reduce energy consumption. A Computational Fluid Dynamics CFD simulation using the ANSYS package was performed to investigate the flow inside the ejector and determine the performance of a small-scale steam ejector. The experimental results showed that at the nozzle throat diameter of 2.6 mm and the evaporator temperature of 10oC, increasing boiler temperature from 110oC to 140oC decreases the entrainment ratio by 66.25%. At the boiler temperature of 120oC, increasing the evaporator temperature from 7.5 to 15 oC increases the entrainment ratio by 65.57%. While at the boiler temperature of 120oC and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Employing the results of evaluating employees'performance in achieving organizational integrity Field study at the Technical Institute in Mosul
...Show More Authors

The objective of the study is to study how to employ performance evaluation in achieving organizational integrity and the impact of performance evaluation on achieving organizational integrity. In light of this, the following questions were raised:

Are the dimensions of organizational integrity available in the field in question?

In order to answer the research questions, a questionnaire questionnaire was distributed to the sample of 30 members of the teaching staff at the Technical Institute in Mosul. The three-dimensional Lycert scale was used. The statistical methods were used, ie, the frequency distribution, the computational circles, the standard deviations, Pearson), simple

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Journal Of Positive School Psychology
Impact Of An Educational Program For Nursing Management About Care Of Children Treated With VP Shunt In Mosul City
...Show More Authors

Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Large Eddy Simulation in Duct Flow
...Show More Authors

In this paper, the problem of developing turbulent flow in rectangular duct is investigated by obtaining numerical results of the velocity profiles in duct by using large eddy simulation model in two dimensions with different Reynolds numbers, filter equations and mesh sizes. Reynolds numbers range from (11,000) to (110,000) for velocities (1 m/sec) to (50 m/sec) with (56×56), (76×76) and (96×96) mesh sizes with different filter equations. The numerical results of the large eddy simulation model are compared with k-ε model and analytic velocity distribution and validated with experimental data of other researcher. The large eddy simulation model has a good agreement with experimental data for high Reynolds number with the first, seco

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Flow injection- Spectrophotometric determination of some catecholamine drugs
...Show More Authors

A new spectrophotometric flow injection method has been establish for the determintaions of some catecholaminedrugs

View Publication Preview PDF