Preferred Language
Articles
/
joe-247
Analysis of Recorded Inflow Data of Ataturk Reservoir
...Show More Authors

Since the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data from the Euphrates River recorded at Ataturk, a spilt-sample approach was adopted for testing homogeneity. The  autoregressive model of order one [AR(1)] was found to be the best for the forecasting as it accurately reproduced the means, standard deviations, and skewness coefficients observed in the generated records forecast at the Ataturk reservoir. Ten sets of 100 years data have been forecasted.

In Iraq, optimization of the operation of all reservoirs is necessary after operating new reservoirs in Turkey.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION: FLOW INJECTION ANALYSIS AND SPECTROPHOTOMETRIC DETERMINATION OF NIFEDIPINEIN PHARMACEUTICAL FORMULATION
...Show More Authors

A new simple and sensitive spectrophotometric method is described for quantification of Nifedipine (NIF) and their pharmaceutical formulation. The selective method was performed by the reduction of NIF nitro group to yield primary amino group using zinc powder with hydrochloric acid. The produced aromatic amine was submitted to oxidative coupling reaction with pyrocatechol and ammonium ceric nitrate to form orange color product measured spectrophotometrically with maximum absorption at 467nm. The product was determined through flow injection analysis (FIA) system and all the chemical and physical parameters were optimized. The concentration range from 5.0 to 140.0 μg.mL-1 was obeyed Beer’s law with a limit of detection and quantitatio

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Fractographic Analysis of Tensile Failures of Zirconia Epoxy Nanocomposites
...Show More Authors

This work characterizes the fractographic features of the neat epoxy and ZrO2 epoxy nanocomposites. All samples were subjected to a tensile test to determine the tensile strength and tensile modulus. SEM images were used to study the morphology of the fractured surface. The fractographic of the fracture surfaces were studied by microstructure analysis program (j-images) to specify the effect of ZrO2 nanoparticles on tensile performance and failure mechanism for ZrO2 epoxy nanocomposites. The tensile test results show that the addition of ZrO2 nanoparticles (2, 4, 6, 8, and 10 vol.%) to the epoxy matrix leads to increase the tensile strength about 40% for optimal content of ZrO2 nanop

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MICROFACIES ANALYSIS OF GHAR FORMATION (WESTERN DESERT OF IRAQ)
...Show More Authors

Ghar Formation outcrop at the Iraqi western desert was studied by microfacies analysis
of (13) thin sections collected from wadi Al-Ratgha ( west of Qaim ) . According to
petrographic com position and organisms content ,rocks were subdivided into (4)
microfacies units :bioclastic wackestone , mudstone , miliolids wackestone , and grainstone
with aggregate grains microfacies .Microfacies units reflect shallow marine environment of
low circulation of very warm water at the middle part . The lower and middle part
interbedded with quite open marine environment below the wave base . The upper part was
deposited at shallow marine environment of low circulation . The main diagenetic processes
were the transformation ( ty

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 15 2019
Journal Name
Journal Of Pharmaceutical And Biological Sciences
Analysis of genome variation in CEs of meningococcal isolates
...Show More Authors

Important points were concluded from this analysis related with the presence of the same variable CEs within multiple isolates with different time points being under the selection and the location of SNPs within the conserved functional pattern of CEs. In the 40 isolates, 9 out of 39 variable CEs conducted with multiple isolates

View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed May 09 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus Crossref