An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive condition inspection data for measuring the waiting times of the pipes at each condition class.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreFlexible pipes, such as GRP pipes, serve as effective underground infrastructure especially as sewer pipeline. This study is an attempt for understanding the effects of bedding types on the behavior of large diameter GRP flexible sewer pipes using three dimensional finite element approaches. Theoretical and numerical analyses were performed using both BS EN 1295-1 approach and finite element method (ABAQUS software). The effects of different parameters are studied such as, depth of backfill, bedding compaction, and backfill compaction. Due to compaction, an increase in the bedding compaction modulus (E’1) results in a reduction of both stresses and displacements of the pipe, especially, for well compacted ba
... Show MoreThe concept of rehabilitation provided an essential richness in the conservation philosophy through sustaining buildings life and adapting them to the contemporary use through a vision which looks at the present and future . In Iraq , the existence of historical buildings and the traditional fabric in the cities required the urban development which enhanced the interests of planning and architectural fields especially the building rehabilitation which requires the architectural intervention , and all that led to elaborate the problem of research which is " The confusion in the concepts of monumental, historical and traditional buildings in Iraq, As well as The insufficient knowledge about rehabilitation and the acts related to it through
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreIn this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show MoreThroughout this paper R represents commutative ring with identity, and M is a unitary left R-module. The purpose of this paper is to study a new concept, (up to our knowledge), named a semi-extending modules, as generalization of extending modules, where an Rmodule M is called semi-extending if every sub module of M is a semi-essential in a direct summand of M. Various properties of semi-extending module are considered. Moreover, we investigate the relationships between semi-extending modules and other related concepts, such as CLS-modules and FI- extending modules.