Preferred Language
Articles
/
joe-247
Analysis of Recorded Inflow Data of Ataturk Reservoir
...Show More Authors

Since the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data from the Euphrates River recorded at Ataturk, a spilt-sample approach was adopted for testing homogeneity. The  autoregressive model of order one [AR(1)] was found to be the best for the forecasting as it accurately reproduced the means, standard deviations, and skewness coefficients observed in the generated records forecast at the Ataturk reservoir. Ten sets of 100 years data have been forecasted.

In Iraq, optimization of the operation of all reservoirs is necessary after operating new reservoirs in Turkey.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Robust Tests for the Mean Difference in Paired Data by Using Bootstrap Resampling Technique
...Show More Authors

The paired sample t-test for testing the difference between two means in paired data is not robust against the violation of the normality assumption. In this paper, some alternative robust tests have been suggested by using the bootstrap method in addition to combining the bootstrap method with the W.M test. Monte Carlo simulation experiments were employed to study the performance of the test statistics of each of these three tests depending on type one error rates and the power rates of the test statistics. The three tests have been applied on different sample sizes generated from three distributions represented by Bivariate normal distribution, Bivariate contaminated normal distribution, and the Bivariate Exponential distribution.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Robust M Estimate With Cubic Smoothing Splines For Time-Varying Coefficient Model For Balance Longitudinal Data
...Show More Authors

In this research، a comparison has been made between the robust estimators of (M) for the Cubic Smoothing Splines technique، to avoid the problem of abnormality in data or contamination of error، and the traditional estimation method of Cubic Smoothing Splines technique by using two criteria of differentiation which are (MADE، WASE) for different sample sizes and disparity levels to estimate the chronologically different coefficients functions for the balanced longitudinal data which are characterized by observations obtained through (n) from the independent subjects، each one of them is measured repeatedly by group of  specific time points (m)،since the frequent measurements within the subjects are almost connected an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Engineering
Analysis of Prosthetic Running Blade of Limb Using Different Composite Materials
...Show More Authors

Prostheses are used as an alternative to organs lost from the body. Flex-Foot Cheetah is considered one of the lower limb prostheses used in high-intensity activities such as running. This research focused on testing two samples of Flex-Foot Cheetah manufactured of two various materials (carbon, glass) with polyester and compare between them to find the foot with the best performance in running on the level of professional athlete. In the numerical analysis, the maximum principal stress, maximum principal elastic strain, strain energy; finally, the blade total deformation were calculated for both feet. In experimental work, the load-deflection test was done for foot to calculate the bending the results were very close to

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 5th International Conference On Information And Communication Technology (icoic7)
Analysis of the number of ants in ant colony system algorithm
...Show More Authors

View Publication
Scopus (28)
Crossref (14)
Scopus Crossref
Publication Date
Sat Dec 14 2019
Journal Name
Journal Of The College Of Education For Women
Analysis of the Structure of Scientific News Headlines in Online Newspapers
...Show More Authors

Newspaper headlines are described as compressed and ambiguous pieces of discourse that represent the bodies of the articles. Their main function is to provide the readers with an informative message they would have no prior idea about. Ifantidou (2009) claims that the function of a headline is to get the readers’ attention rather than providing information because it does not have to represent the whole of the article it refers to. This paper aims at examining this hypothesis in relation to scientific news headlines reported by a number of news agencies. The paper follows Halliday (1967) information structure theory by applying it on ten selected headlines; each two headlines represent one scientific discovery reported by different new

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 16 2009
Journal Name
Journal Of Planner And Development
Quantitative analysis of the economic characteristics of the land transport network
...Show More Authors

Highway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
2015 International Symposium On Mathematical Sciences And Computing Research (ismsc)
Analysis of significant dimensions of e-service quality in Malaysian universities
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref