Preferred Language
Articles
/
5xbgUocBVTCNdQwCEURL
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand hours showed that the pumps unit capability cannot cover the high water demand during that time and resulted in a loss of pressure values, which were ranged between 0.2 and 2.1 bar. Moreover, the simulated results of the residual chlorine levels were within the permissible limits of 0.4–0.7 ppm, in different locations in the network. Providing good quality and adequate water supply is an important component for human life development. Modeling WDS is an efficient method of gaining a true understanding of the functioning of the network and determining the factors and conditions affecting the performance of the network.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Oct 16 2019
Journal Name
International Journal Of Research In Pharmaceutical Sciences
Depression, Anxiety and Stress Among a Sample of Chronic Hepatitis C Patients in AL-Najaf Province /Iraq
...Show More Authors

Previous studies in Euro-American countries have shown that patients with chronic hepatitis C virus infection have increased levels of neuropsychiatric symptoms. While chronic hepatitis C virus infection has been reported in Arab countries such as Iraq, there is little studies about the neuropsychological burden associated with chronic hepatitis C among patients in the Arab region. The aim of the current study was to measure the prevalence and level of severity of depression, anxiety and stress among a sample of chronic hepatitis C patients in AL-Najaf province /Iraq. The current study was cross-sectional study carried out on (110) already diagnosed chronic viral hepatitis C patients who attended the Gastroenterology and Hepatology

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Computers And Electronics In Agriculture
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

View Publication
Crossref (113)
Crossref
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
Political Participant Psychology of Baghdad Governorate Citizens
...Show More Authors

Psychological studies expanded very much, but the researchers forgot very important subjects such as Political participant, and they put their efforts in reading resources to try insuring its results, or to applying it in logic environment and its different Cultures from our Culture in its Values, Criterion, and Attitudes that use their results more difficult. Despite of research movement expansion, but critic was still especially in Political Psychology field, and may be took thritically from researches, and they remote from it practically, and this study a sereace try to put a practical principle that our society need it especially which we practice the Political participant every four years, and we practice it in our departmen

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Simulation and Analysis of the OFDM Transceiver Based Commutation System
...Show More Authors

As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation and Simulation in Batch Fermentation of Baker's Yeast Production
...Show More Authors

Baker's Yeast is an important additive among the substances, which improves bred quality, thus, a consideration has been made to study the conditions and parameters that affecting the production of the yeast in a batch fermenter experimentally and theoretically. Experimental runs were implemented in a 12-liter pilot-scale fermenter to predict the rate of growth and other parameters such as amount of additive consumed and the amount of heat generated. The process is modeled and performed using a computer programming prepped for this purpose, the model gave a good agreement comparing to the experimental work specially in the log phase.

View Publication Preview PDF
Publication Date
Thu Apr 18 2013
Journal Name
International Journal Of Computer Applications
Design and Simulation of Hartley based Multi Orthogonal Band OFDM
...Show More Authors

Recent advances in wireless communication systems have made use of OFDM technique to achieve high data rate transmission. The sensitivity to frequency offset between the carrier frequencies of the transmitter and the receiver is one of the major problems in OFDM systems. This frequency offset introduces inter-carrier interference in the OFDM symbol and then the BER performance reduced. In this paper a Multi-Orthogonal-Band MOB-OFDM system based on the Discrete Hartley Transform (DHT) is proposed to improve the BER performance. The OFDM spectrum is divided into equal sub-bands and the data is divided between these bands to form a local OFDM symbol in each sub-band using DHT. The global OFDM symbol is formed from all sub-bands together using

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Performance application of ultraviolet disinfection technique for raw water
...Show More Authors
Abstract<p>Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex</p> ... Show More
View Publication
Scopus Crossref