Diyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed through, two roughness coefficients of 0.035 and 0.028 were applied. An outflow downstream Hemrin Dam varies from 1100m3/s to 1800m3/s was applied as boundary condition upstream Diyala River. One dimensional hydraulic model was developed for the escape and the river, the results showed that aside weir could be constructed at the escape entrance with crest level 67m.a.m.s.l. and 800m width, followed by drop structure of four rectangular steps, this case provides safe discharge to Diyala River if flood wave of 1500m3/s released from Hemrin Dam.
In this study water quality was indicated in terms of Water Quality Index that was determined through summarizing multiple parameters of water test results. This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management and decision making. The application of Water Quality Index (WQI) with sixteen physicochemical water quality parameters was performed to evaluate the quality of Tigris River water for drinking usage. This was done by subjecting the water samples collected from eight stations in Baghdad city during the period 2004-2010 to comprehensive physicochemical analysis. The sixteen physicochemical parameters included: Turbidity,
... Show MoreThe purpose of this paper is to build a simulation model by using HEC-RAS software to simulate the reality of water movement in the main river of Basra City (South of Iraq) which is known as Siraji-Khoura River. The main objective of the simulation is to detect areas where the water cycle is interrupted in some stations of the river stream, as this river has become an outlet for the disposal of sewage, leading to pollution and causing weakness in some sections of the river & obstructing the water cycle that takes place between this river and Shatt al – Arab river. A field survey data of the river and its banks were adopted to derive the grades, longitudinal and cross sections of the river, these data included three-dimensional coordinates
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreA single specimen of the African catfish, Clarias gariepinus, was recorded for the first time in Baghdad, Iraq. The specimen was caught during a fish survey to document some local species in northern Baghdad (Al-Rusafa) on March 21, 2023. The total length of the specimen was 43 cm, and its weight was 590 grams. Some biometric measurements of the specimen were studied and found to be consistent with the general characteristics of the African catfish Clarias gariepinus (Burchell, 1822). It is possible that the fish entered Iraqi inland waters, specifically from the Euphrates River via Syria or from the Tigris River via Turkey.
The subject of the information technology system ( ITS ) of the important issues And contemporary thought in management, and various types of organizations seeking to apply and try to
... Show MoreProduced water is accompanied with the production of oil and gas especially at the fields producing by water drive or water injection. The quantity of these waters is expected to be more complicated problem with an increasing in water cut which is expected to be 3-8 barrels water/produced barrel oil.Produced water may contain many constituents based on what is present in the subsurface at a particular location. Produced water contains dissolved solids and hydrocarbons (dissolved and suspended) and oxygen depletion. The most common dissolved solid is salt with concentrations range between a few parts per thousand to hundreds parts per thousand. In addition to salt, many produced waters also contain high levels of heavy metals like zinc, bari
... Show MoreGenetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More