Preferred Language
Articles
/
jpd-144
planning and design of a tourist village in the marshes of southern Iraq
...Show More Authors

This study analyzes how to make use of the resources in the marshlands of Iraq and how to utilize them, especially after the water returns to these areas and they are revitalized. We take an example of AL- Saheen Marsh and plan an ideal tourist resort there. This example can further expand to include other parts of the marshlands. The resort will utilize the local environment and tourist characteristics as it will have a feel and architectural resemblance to the houses and buildings that are currently built there. In addition the transportation methods will be the same as those used by the locals. Yet the resort will still posses all the facilities required by a modern tourist resort that includes all the services that will make the guest comfortable. Through this resort there will be a movement of Arab and foreign tourists that will result in an exchange of cultures. The tourist will be introduced to the culture of the area and will commence in the various local activities. That , in addition to the apparent immense financial advantages of this project that will have a considerable returns for the area and the country as a whole. It will also employ a considerable number of local people hence reducing the unemployment rate in that area in addition to the social and economic advantages for the marshland society.

View Publication
Publication Date
Sat Aug 21 2021
Journal Name
Engineering, Technology & Applied Science Research
A Comparison between Static and Repeated Load Test to Predict Asphalt Concrete Rut Depth
...Show More Authors

Rutting has a significant impact on the pavements' performance. Rutting depth is often used as a parameter to assess the quality of pavements. The Asphalt Institute (AI) design method prescribes a maximum allowable rutting depth of 13mm, whereas the AASHTO design method stipulates a critical serviceability index of 2.5 which is equivalent to an average rutting depth of 15mm. In this research, static and repeated compression tests were performed to evaluate the permanent strain based on (1) the relationship between mix properties (asphalt content and type), and (2) testing temperature. The results indicated that the accumulated plastic strain was higher during the repeated load test than that during the static load tests. Notably, temperatur

... Show More
View Publication
Crossref (15)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 18 2022
Journal Name
Sustainability
A Sustainable Cold Mix Asphalt Mixture Comprising Paper Sludge Ash and Cement Kiln Dust
...Show More Authors

Concerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro

... Show More
View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2024
Journal Name
The Saudi Dental Journal
Different pulp capping agents and their effect on pulp inflammatory response: A narrative review
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Minerva Dental And Oral Science
Salivary interleukin-1β as a biomarker to differentiate between periodontal health, gingivitis, and periodontitis
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Assessment of Some Physiological, Immunological and Molecular Biomarkers in Sample of Iraqi Women Undergoing Caesarean Section and Normal Delivery
...Show More Authors

     Pregnancy and delivery are physiological conditions that are marked by abrupt alterations to hormones, immunological and molecular characters. The current study aimed to evaluate oxytocin (OT), prolactin (PRL), cortisol and insulin growth factor-2 (IGF-2) levels as physiological biomarkers; programmed cell death protein-1 (PD-1), programmed cell death ligand-1 (PD-L1),interleukin-6 (IL-6) as immunological biomarkers, and single nucleotide polymorphisms (SNPs; rs53576 and rs2254298) of oxytocin receptor gene OXTR as molecular factors in samples of Iraqi women undergoing caesarean section (CS) and normal delivery (ND). Blood samples were collected from 96 pregnant women at term with ages ranging between 16-43 years. Regarding

... Show More
View Publication
Scopus Crossref