Preferred Language
Articles
/
joe-2251
Detection and Removal of Polycyclic Aromatic Hydrocarbon from Selected Areas in Tigris River in Baghdad City
...Show More Authors

Aromatic hydrocarbons present in Iraqi national surface water were believed to be raised principally from combustion of various petroleum products, industrial processes and transport output and their precipitation on surface water.
Polycyclic aromatic hydrocarbons (PAHs) were included in the priority pollutant list due to their toxic and carcinogenic nature. The concern about water contamination and the consequent human exposure have encouraged the development of new methods for
PAHs detection and removal.
PAHs, the real contaminants of petroleum matter, were detected in selected sites along Tigris River within Baghdad City in summer and winter time, using Shimadzu high performance liquid chromatography (HPLC) system.
Analysis of samples from selected sites proved that the most abundant component of aromatic hydrocarbons were phenanthrene naphthalene, and acenaphthylene, followed by fluorene, acenaphthene, fluoranthene, benzo (a) pyrene, anthracene. and pyrene were
present in low concentrations ranging in a descending order. Chrysene and benzo (a) anthracene were found in very low concentration.
A laboratory unit was designed to optimize the factors which may influence the feasibility of degradation processes of naphthalene and phenanthrene in aqueous matrices by oxidation with Fenton reagent. The study proved that 83% and 79% removal of naphthalene and phenanthrene were achieved applying optimum conditions of pH=3, temperature=40 ° C, H2O2=50 ppm and Fe2+ catalyst = 6 ppm

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS
...Show More Authors

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Artificial Intelligent Models for Detection and Prediction of Lost Circulation Events: A Review
...Show More Authors

Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASUREMENT OF SOCIAL RESPONSIBILITY ACCORDING TO THE STANDARD ISO 26000 CASE STUDY IN RUSHED BANK/BAGHDAD.: MEASUREMENT OF SOCIAL RESPONSIBILITY ACCORDING TO THE STANDARD ISO 26000 CASE STUDY IN RUSHED BANK/BAGHDAD.
...Show More Authors

Objective the research is to identify Over the Commitment of a Rushed Bank in Baghdad has applied social responsibility in accordance with ISO 26000 by measuring and diagnosing the gap between the actual reality in the bank and the requirements of the standard.

View Publication Preview PDF
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
First Occurrence of Plagioporus skrjabini Kowal, 1951 (Trematoda: Opecoelidae) in Iraq from the Sisorid Catfish Mystus pelusius
...Show More Authors

The trematode Plagioporus skrjabin iKowal, 1951 was recorded in this study for the first time in Iraq from intestine of Mystus pelusius
(Solander, 1794) which were collected from different locations along Tigris River near Al-Shawwaka region, Baghdad city. The description and measurements of this parasite as well as its illustration were given.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Measurable Mistakes in Architecture the Effect of Designer's Experience on the Propagation of Mistakes in Architectural Design - Residential Buildings in Al Sulaymaniyah City as a Case Study
...Show More Authors

The importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process.  The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Translational Andrology And Urology
Robotic-assisted magnetic resonance imaging ultrasound fusion results in higher significant cancer detection compared to cognitive prostate targeting in biopsy naive men
...Show More Authors

View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Relationship between the Strategies of E-marketing mix and Marketing Effectiveness of the Palestinian Small Business Industrial Organizations in the City of Hebron
...Show More Authors

In the city of Hebron, small business industrial organizations face a major challenge related to its ability to reach, attract and sustain a sufficient number of customers in order to ensure its continuity and sustainability. The research problem is summarized in an attempt to reveal how the e-marketing could improve and support the marketing effectiveness of small business industrial organizations in the city of Hebron/Palestine. The importance of this research stems from the fact that it addresses a new knowledge branch of the field of marketing, which is electronic marketing for small business organizations, and the fact that the research highlights appropriate marketing solutions for these organizations in light of the Intern

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref