Preferred Language
Articles
/
joe-1467
Controlling the Salt Wedge Intrusion in Shatt Al-Arab River by a Barrage
...Show More Authors

Shatt Al-Arab River in Al Basrah, Iraq, has recently recorded massive levels of TDS values (Total Dissolved Solids) in the water as a result of reduced fresh water discharge from sources, causing the river to become salinized due to salt wedge intrusion. Therefore, a block dam in the south reach is required to salt intrusion prevention. The main objective of this research is to simulate the hydraulic impact of a suggested barrage in Ras Al Besha on the Shatt Al-Arab River. The HEC-RAS (5.0.7) model was used to develop a one-dimensional unsteady model to gaining an understanding of the proposed barrage's influence on river behaviour. The daily discharges of the Tigris River provided as the upstream boundary conditions, while the hourly water levels of the Shatt Al-Arab River provided as the downstream boundary conditions. The model was initially run on the basis of daily discharges in Aug 2018 and March 2020 for the model's calibration and verification. Then, a model was run with a proposed barrage, Four cases of discharge were chosen which were the low and moderate discharge that equal to (20-50-100 and 250) m3/s with adopted spring tide cycle. The operation scenarios were examined under the influence of three cases of barrage gates (fully opened, 50% open and programmed opening). The results indicate that the investigated discharges will cause a significant problems in navigation depths, especially in the case of the programming of gates opening where the stages drop range between 2.01-3.3m comparing with the normal case. Furthermore, the velocity indicators show that the significant reduction in velocity upstream the barrage led to more sedimentation in the river reach.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The women at Al-Sakhaawi Book "A;-Dhau Al-Lami", Study in the social life
...Show More Authors

In our previous research , we study the method of women by ( al – sakhaawi " died 902
ah/1496a.c"book witch called ( al- dhau, al-lami) .
So in this paper , we will discuss the social life of women in the mamluk period through the
same book ,especially when the sakhaawi devoted a full part for women in the same book
called it (mhagam ,al –nessa)wich it translations a large number of women like wives
,daughters ,sisters ,and maids of mamluk sultans ,so that make my able to know a lot about
the social life of woman which we study it like a social aspects of women, here wealth,
business, professions ,and in the last we study the habits of them marriage .

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Corporate Ownership And Control
Planning and controlling of intellectual capital: The role of beyond budgeting
...Show More Authors

The purpose of this study is to explore whether the adoption of Beyond Budgeting (BB) as a management accounting practice (MAP) contributes to developing intellectual capital (IC) and creating value in Iraqi companies. This requires an understanding of the views of the Iraqi managers about the nature of the information provided by this practice, which may be used to determine whether this information is relevant in the management of IC in the context of Iraq. This research aims also to explore the challenges of the adoption of the BB in planning and controlling IC in Iraq. The study adopts a qualitative approach and an interpretive paradigm. It also adopts a semi-structured interview method of collecting data from executive managers

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Image of Women in Arab Media Advertisements: معجب بن عثمان الزهراني
...Show More Authors

Advertisements containing images of women represent one of the most controversial topics of the advertising industry and has an impact on people and trends. This study aims to determine the typical mental image of women purveyed through visual advertising in the Arab media. It also aims to find out whether these advertisements portray women positively or negatively, in addition to investigating the reasons for the recent negative portrayal of women in commercials. The study adopted a descriptive-analytical approach to achieve these objectives. The results indicate that advertising designs that carry images of women displayed in the Arab media create strong mental images. Repetition reinforces these images, and they emphasize the concept

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
The Effect of Ferric Citrate in Controlling Iron Deficiency Anemia and its Tolerability in a Sample of Iraqi Hemodialysis Patients: Randomized Controlled Clinical Trial
...Show More Authors

Background: The iron deficiency anemia along with hyperphosphatemia are the main complications of dialysis patients. Traditional iron supplement has been failed to correct iron deficiency anemia, therefore, the current study aimed to investigate the efficacy and tolerability of new phosphate binder, ferric citrate, in a sample of Iraqi patients with end stage renal disease on maintenance hemodialysis. Method: Prospective, randomized, open label, active controlled trial was conducted in one center for dialysis in Babylon governance. Patients were randomized to receive ferric citrate with dose of 6 g/d and calcium carbonate with dose of 3 g/d for eight weeks. Hemoglobin concentration, mean corpuscular hemoglobin concentration and count o

... Show More
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Https://www.researchgate.net/journal/international-journal-of-science-and-research-ijsr-2319-7064
Evaluation of Water Quality using Bhargava Water Quality Index Method and GIS, Case Study: Euphrates River in Al-Najaf City
...Show More Authors

ENGLISH

Crossref (4)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effectiveness of Quantitative Instruments in Controlling Money Supply: An Applied Research in the Central Bank of Iraq
...Show More Authors

This research deals with the role of quantitative (indirect) tools of monetary policy that used by the Central Bank of Iraq in order to control and manage the size of the money supply that intermediate goal through which monetary policy is able to achieve its final goals, foremost among which is to reduce inflation and raise the value of the local currency in front of foreign currency rates. The research is based on a major hypothesis stating that quantitative tools have a direct and strong influence on the money supply, especially under the circumstances of the shift towards a market economy. There has been a branching relationship with this statistically significant relationship between the money supply and the quantitative tools used

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2018
Journal Name
Indian Journal Of Agricultural Research
Anatomical and physiological traits of broad bean (Vicia faba L.) seedling affected by salicylic acid and salt stress
...Show More Authors

A laboratory experiment was carried out at the College of Agriculture University of Baghdad in 2017. The aim was to improve the anatomical and physiological traits of broad bean seedling under salt stress by soaking it in salicylic acid. The concentrations of salicylic acid were 0, 10, and 20 mg L-1 and the electrical conductivity levels were 0, 3, and 6 dS m-1. The complete randomized design was used with four replications. The increasing of salicylic acid concentration up to 10 mg L-1 led to increasing the stem cortex thickness, stem vascular bundles thickness, and root cortex thickness significantly by (34.9,36.7,and 55 µm) respectively, while the treatment of 20 mg L-1 led to decreasing these traits by (28.2, 27.8, and 48.1 µm

... Show More
View Publication
Scopus (20)
Crossref (1)
Scopus Crossref