Preferred Language
Articles
/
joe-930
Utilizing the Main Outfall Drain-Addalmage Lake System for Hydroelectric Power Generation
...Show More Authors

The basic idea of the Main Outfall Drain, MOD, was to construct a main channel to collect saline drained water of the irrigation projects within central and southern parts of Iraq and discharge it down to the Arabian Gulf. The MOD has a navigation lock structures near Addalmage Lake at station 299.4km. This structure is designed to ensure navigation within the MOD. The water level difference upstream the cross regulator and the downstream conjugation structure is about 9m. This head difference can be used to generate electrical power by constricting a low head power plant. This study aimed to utilize the head difference in navigation lock structures for power generation. Different operation condition and locations plants were examined. Hydrologic and hydraulic simulations were used to analyze the system of the MOD-Addalmage Lake system. Results showed that the water level are kept below the dike level along the reaches in the all alternatives and the maximum average annual power generated vary between 3.41MW to 5.55MW depending on the selected alternative of operation and the site of the plant

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 14 2023
Journal Name
Iete Journal Of Research
Performance Enhancement of VLC-NOMA Employing Beamforming Function based vehicle-to-multivehicle Communication system
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Eliminate harmful side – effects of Controls System by designing Activity – Based Responsibility Accounting model
...Show More Authors

This research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.

In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.

The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Role of System Strategic Learning Smart In Sustainability Success of Managing Network e-Business
...Show More Authors

Purpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.

Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.

Methodology:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 20 2020
Journal Name
International Medical Journal
Cleaning efficacy and instrumentation time using rotary file system in primary molars (comparative study)
...Show More Authors

ABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a

... Show More
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improving Treatment Performance of Dissolved Air Flotation System by Using Ionic Liquids as Surfactants
...Show More Authors

The effect of three ionic liquids viz., 1-hexyl-3-methylimidazolium tetrafluoroborate (ILE), 1-hexyl-3-metylimidazolium hexafluorophosphate (ILF) and 1-octyl-3-methylimidazolium tetrafluoroborate (ILG) when used as surfactants on the performance of dissolved air floatation (DAF) was investigated.

   Experiments were conducted at a temperature of 30-35 ºC, 10ppm ferric chloride as coagulant, 50% recycle ratio, pH 8, and 10 minutes treatment time  to find oil and grease (OG) and turbidity removal efficiencies at saturation pressure (2-6) bar.

ILs were used at concentration of 50 µl/liter of treated water in two positions in DAF system; the saturation vessel and the treatment tank. The performance using ILs

... Show More
View Publication Preview PDF