Preferred Language
Articles
/
bRg4rJQBVTCNdQwCfR51
Prepare Maps For Greenhouse Gases With Some Weather Elements For Baghdad City Using Data Observation And Arc-GIS Techniques
...Show More Authors
Abstract<p>Air pollution refers to the release of pollutants into the air that are detrimental to human health and the planet as a whole.In this research, the air pollutants concentration measurements such as Total Suspended Particles(TSP), Carbon Monoxides(CO),Carbon Dioxide (CO2) and meteorological parameters including temperature (T), relative humidity (RH) and wind speed & direction were conducted in Baghdad city by several stations measuring numbered (22) stations located in different regions, and were classified into (industrial, commercial and residential) stations. Using Arc-GIS program ( spatial Analyses), different maps have been prepared for the distribution of different pollutant concentrations of the city of Baghdad. These maps indicate where the highest and lowest concentrations are based on the color gradient of the map.</p>
Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Comparative Analysis of Various Multicarrier Modulation Techniques for Different Multilevel Converters
...Show More Authors

The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF DIFF. SUBS. AND SPRAYING WITH K2SIO3 ON THE ROOT AND VEGETATIVE GROWTH OF L. W. PLANTS IN BAGHDAD CITY
...Show More Authors

This study was aimed to investigate the response of two types of ornamental herbaceous plants (Wedelia trilobata and Jacobaea maritima 'Cirrus') to different agricultural environments and the application of potassium silicates to the living walls system LWS (Felt layer system) under the climate conditions of Baghdad city. Each experiment involved the cultivation of a different plant species, and the study duration was from September 15, 2021, to August 1, 2022. A Strip-Plot Design experiment was conducted using two factors: factor M with four levels of substrates (50% peatmoss and perlite (M1), 50% Vermicompost and perlite (M2), 50% Water hyacinth compost and perlite (M3), 50% wheat straw compost and perlite (M4)) and factor S with

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science &amp; Information Technology ( Cs &amp; It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of some new heterocyclic derivatives from aromatic carbonyl ‎compounds and carboxylic acids with Evaluation some of them for biological activity
...Show More Authors

     In this research investigation, a total of eighteen diverse tetra- and penta-lateral cyclic compounds were synthesized. These included 1,3,4-thiadiazole, thiazolidin-4-one (via an alternative method), 1,2,4-triazole, carbothioamide, thiazole-4-one, azetidin-2-one, and oxazole. The synthesis procedure entailed a sequence of reactions. The thiazolidine-4-one 1 was obtained by reaction p-aminobenzoic acid with thiosemicarbazide, followed by treatment with p-tolualdehyde to produce Schiff base 2. Reaction Schiff base 2 with mercaptoacetic acid in dry benzene was carried out to produce thiazolidine-4-one 3. In another synthesis pathway, the esterification of p-nitro benzoic acid with ethanol in the presence of sulfuric acid was

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Sep 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Incidence of Hodgkin's lymphoma of head and neck in Baghdad city
...Show More Authors

Background: Hodgkin's lymphoma (HL), formerly called Hodgkin's diseases is an uncommon form of lymphoma. The incidence of Hodgkin's lymphoma shows marked heterogeneity with respect to age, gender, race, geographic area, social class and histological subtype. This study was carried out in an attempt to evaluate the incidence of Hodgkin's lymphoma of head and neck in Baghdad city. Materials and Methods: The diagnosed cases of Hodgkin's lymphoma of head and neck region in Baghdad city between (1990-1999) were collected and analyzed according to age, gender, site and the histopathological subtypes of the tumor. Results: Out of (702) cases of Hodgkin's lymphoma of ten years between (1990-1999),(362 ) of them were occurred in the head and neck

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref