Preferred Language
Articles
/
bsj-6420
Using Remote Sensing and Geographic Information Systems to Study the Change Detection in Temperature and Surface Area of Hamrin Lake
...Show More Authors

This study was conducted on Lake Hamrin situated in Diyala governorate, focal Iraq, between latitudes 44º 53ʹ 26.16 '- 45º 07 ʹ 28.03ʺ and 34º 04ʹ 24.75ʺ ــ 34º 19ʹ 12.74ʺ . As in this study, the surface area of Hamrin Lake was calculated from satellite images during the period from October 2019 to September 2020, with an average satellite image for each month, furthermore,by utilizing the Normalized Differences Water Index (NDWI), the largest surface area was 264,617 km2 for October and the lowest surface area 140.202 km2 for September. The surface temperature of the lake water was also calculated from satellite images of the Landsat 8 satellite, based on bands 10 (Thermal Infrared 1) and 11 (Thermal Infrared 2) that are sensitive to thermal radiation, as the highest surface temperature reached in June 45.49°C degrees Celsius due to the high temperatures for this month and the lowest in February 3.09°C degrees Celsius, which is one of the months in which temperatures drop to the lowest level. The utilization of remote sensing and GIS innovations has helped a lot in checking changes, whether in surface area or temperature, which saves effort, time and cost. The results of this study put decision makers in taking the necessary precautions for the seasons of water scarcity and drought to meet the community’s water needs in the areas of multiple human consumptions and at the same time take advantage of rainy seasons and water abundance to develop long-term strategic plans to maintain a sustainable water balance.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Enhancement of NO2 gas sensing behavior for ZnS/PPy nanostructure by loading graphene
...Show More Authors

The pure ZnS and ZnS-Gr nanocomposite have been prepared
successfully by a novel method using chemical co-precipitation. Also
conductive polymer PPy nanotubes and ZnS-PPy nanocomposite
have been synthesized successfully by chemical route. The effect of
graphene on the characterization of ZnS has been investigated. X-ray
diffraction (XRD) study confirmed the formation of cubic and
hexagonal structure of ZnS-Gr. Dc-conductivity proves that ZnS and
ZnS-Gr have semiconductor behavior. The SEM proved that
formation of PPy nanotubes and the Gr nanosheet. The sensing
properties of ZnS-PPy/ZnS-Gr for NO2 gas was investigated as a
function of operating temperature and time under optimal condition.
The sensitivity,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
Gas Sensing of (SnO2)1-x(ZnO)x Composite Associating with Electrical Properties
...Show More Authors

Abstract

Semiconductor-based gas sensors were prepared, that use n-type tin oxide (SnO2) and  tin oxide: zinc oxide composite (SnO2)1-x(ZnO)x at different x ratios using pulse laser deposition at room temperature. The prepared thin films were examined to reach the optimum conditions for gas sensing applications, namely X-ray diffraction, Hall effect measurements, and direct current conductivity. It was found that the optimum crystallinity and maximum electron density, corresponding to the minimum charge carrier mobility, appeared at 10% ZnO ratio. This ratio appeared has the optimum NO2 gas sensitivity for 5% gas concentration at 300 °C working temperat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Apr 03 2011
Journal Name
Journal Of Educational And Psychological Researches
The use of the husband of violence against his wife who is a kindergarten teacher
...Show More Authors

Wives generally and working wives especially may encounter in some
families forms of physical or psychological violence through all the
levels or whether it was a psychological intimidation or cursing and
insolence and detracting her human . value and the husband marries
another woman or uses physical abuse against her and beating and
sexual abuse of the wife are also included in this from . it is noticed that
the violent attitude of the husband may take one from or it may change
and alter with time for it might lead to the increase of the possibility of
violence to occur in different ways
The importance of this study comes out from the step that on which in
folds the problem of the use of the husband of vio

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Using a novel approach to determine the pore pressure of West Qurna 15 oil well in South of Iraq
...Show More Authors

Pore pressure means the pressure of the fluid filling the pore space of formations. When pore pressure is higher than hydrostatic pressure, it is named abnormal pore pressure or overpressure. When abnormal pressure occurred leads to many severe problems such as well kick, blowout during the drilling, then, prediction of this pressure is crucially essential to reduce cost and to avoid drilling problems that happened during drilling when this pressure occurred. The purpose of this paper is the determination of pore pressure in all layers, including the three formations (Yamama, Suliay, and Gotnia) in a deep exploration oil well in West Qurna field specifically well no. WQ-15 in the south of Iraq. In this study, a new appro

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 08 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Effect of using the simultaneous electronic presentations strategy in teaching basic skills of basketball to second-grade intermediate students
...Show More Authors

The primary aim of this study was to identify the effect of using the simultaneous electronic presentations strategy in teaching basic skills of basketball to second-grade intermediate students. The present study had a parallel group, pre-post experimental design. In the present study the students of the Salah al-Din Intermediate School for the academic year 2020-2021 constituted the research community. A total of 75 students were present in the research community. Out of 75 students 16 students were selected as the participants for the study. The students falling within the age group of 13-14 years were recruited as the study participants, making up a percentage of 21.33 of the total number. Based on the results of th

... Show More
View Publication
Crossref (1)
Scopus Crossref