Preferred Language
Articles
/
hBdrMI8BVTCNdQwCmV83
Effect of irrigation levels and organic matter on quality chracteristics of chilli pepper under organic farming system
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Evaluation and Development of the (Hilla – Daghara) Rivers System
...Show More Authors

Shatt Al-Hilla branches from the left of Euphrates River, U/S Hindiyah Barrage, Iraq, and extends about 100 km. It branches at the end into Shatt Al-Diwaniya 112 km and Shatt Al-Daghara 64 km. The study aims to evaluate and develop (Hilla-Daghara) rivers system, which is included Shatt Al-Hilla and Shatt Al-Daghara. Fieldwork began from (26 October until December) 2020. M9, S5 devices, and the installed staff gauges were used to measure discharges and water levels, respectively. A one-dimensional model was developed for the study area by HEC-RAS, after calibration and verification by field measurements; the Manning's n of Shatt Al-Daghara is found to be 0.022. Five Scenarios were simulated to study the reach under the cu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
A Vision to Develop the Effectiveness of the Dissemination of Innovations to Rationalize the Use of Irrigation Water in Iraqi Agriculture
...Show More Authors
Abstract<p>Iraqi agriculture faces a major water problem, affecting cultivated areas, agricultural production, farmers’ incomes and food security. However, the results achieved in rationalizing the use of irrigation water are still limited and do not match what they should be in order to meet this serious challenge. The study aimed to provide a vision for the development of the effectiveness of the dissemination of innovations to rationalize the use of irrigation water in Iraqi agriculture. In light of the framework of the dissemination of agricultural innovations, factors related to their effectiveness, and the summary of the Iraqi experience in the field of dissemination of modern irrigation</p> ... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
Improvement of the Hydrodynamic Behavior and Water Quality Assessment of Al-Chibayish Marshes, Iraq
...Show More Authors

Al-Chibayish Marsh (CM)  is considered as the major part of Central Marshes area of this marsh is 1050 Km². The water quality of these marshes is suffering from salt accumulation due to intensive dam construction, limited supply of water from sources,  climate change impacts, and the absence of outlet flow from these marshes, specifically at low flow periods. So, the current research aims to assess and improve these marshes' hydraulic behavior and water quality and define the best location for outlet drains.  Field measurements and laboratory tests were conducted for two periods (November 2020 and February 2021) to define the (TDS) concentrations at nine different locations. Samples were also examined for water's phy

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Sep 19 2024
Journal Name
Baghdad Science Journal
Evaluation of SOD and MDA levels with the Cytotoxicity of some Plant Extracts Toward Human Rhabdomyosarcoma Cell Lines
...Show More Authors

حظيت السمية الخلوية للمستخلصات النباتية باهتمام كبير في السنوات الأخيرة لتقييم نشاطها ضد الأورام. تركز الوقاية الكيميائية من السرطان على السمية الخلوية للمستخلصات النباتية لتكون سامة تجاه خطوط الخلايا السرطانية دون أن تؤثر على الخلايا الطبيعية. الهدف من هذه الدراسة هو تقييم السمية الخلوية لمستخلصي الزنجبيل و أوراق الزيتون ومزيجهما بنسبة 1: 1 تجاه خطوط خلايا RD وتقدير فعالية هذه المسخلصات ضد الاجهاد التا

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus