Preferred Language
Articles
/
joe-1467
Controlling the Salt Wedge Intrusion in Shatt Al-Arab River by a Barrage
...Show More Authors

Shatt Al-Arab River in Al Basrah, Iraq, has recently recorded massive levels of TDS values (Total Dissolved Solids) in the water as a result of reduced fresh water discharge from sources, causing the river to become salinized due to salt wedge intrusion. Therefore, a block dam in the south reach is required to salt intrusion prevention. The main objective of this research is to simulate the hydraulic impact of a suggested barrage in Ras Al Besha on the Shatt Al-Arab River. The HEC-RAS (5.0.7) model was used to develop a one-dimensional unsteady model to gaining an understanding of the proposed barrage's influence on river behaviour. The daily discharges of the Tigris River provided as the upstream boundary conditions, while the hourly water levels of the Shatt Al-Arab River provided as the downstream boundary conditions. The model was initially run on the basis of daily discharges in Aug 2018 and March 2020 for the model's calibration and verification. Then, a model was run with a proposed barrage, Four cases of discharge were chosen which were the low and moderate discharge that equal to (20-50-100 and 250) m3/s with adopted spring tide cycle. The operation scenarios were examined under the influence of three cases of barrage gates (fully opened, 50% open and programmed opening). The results indicate that the investigated discharges will cause a significant problems in navigation depths, especially in the case of the programming of gates opening where the stages drop range between 2.01-3.3m comparing with the normal case. Furthermore, the velocity indicators show that the significant reduction in velocity upstream the barrage led to more sedimentation in the river reach.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 15 2020
Journal Name
Journal Of Engineering Science And Technology
INFLUENCE OF A RIVER WATER QUALITY ON THE EFFICIENCY OF WATER TREATMENT USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of the Satirical Language in Al-Hajjar's Caricatures
...Show More Authors

The present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The stylistics of expressive structure in Al-Sayyab's attempt- A textual study
...Show More Authors

Our research tends to study the poetic attempt of  Badr Shakir Al-Sayyab and examine it stylistically, and we suggested his mature collection '' Rain song'' as a pattern for our textual analysis of the poet's attempt.

   In the beginning , we confirm that branches of applied structures meet to produce poetry such as narration , drama , cinema , mythology , allegory , various religious and historical texts , previous events , and special cumentary events related to work production. If all above-mentioned was complicated and disregarded throughout a single text , the text writer would not secure positive results that might keep open continuity between him and his readers.

   Therefore , this issue w

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The political and economic repercussions of the Chinese Marshall Plan on the Arab world
...Show More Authors

China is moving towards building the largest economic power in the world, so what does this mean economically and politically for Europe, America, the Middle East and the Arab world? This project is called the expansionist Chinese Marshall Plan which is a revival of the old Silk Road in a new way. It represents the aspirations of the Chinese people and their president, Xi Jinping, to build a transport route from Asia to Europe and a railway plan to transport goods. The purpose of this is to develop the economic growth model, expand into new markets, promote the Chinese currency, and expand economic and political influence in the areas covered by the Chinese initiative. Equal opportunities in distributing investments to these countries, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Formulas The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study.: The command and its style in Surat Al-Ma’idah is a rhetorical fundamentalist study
...Show More Authors

Research Summary :

      Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:

     This is a brief research that contained its two rudders the command and its Style in Surat Al-Ma’idah a fundamental rhetorical study, and the study clarified the meaning of imperative in both;  the Arabic  language and in the terminology of the fundamentalists and rhetoricians in a concise manner, and then indicated the imperative of the command , the true meaning, and the meanings interpretated as an  imperative form. I have mentioned some verses of Surat Al-Ma’idah, so what I have quot

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Prepare a plan for the Total Productive Maintenance in the light of the concurrent engineering A Field Study in AL-Askandria General Company Machanical Industries and AL-Musaib Electric Power Station
...Show More Authors

           Strives Total Productive Maintenance  to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.

    Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Efforts in cataloging manuscripts some Arab and international libraries
...Show More Authors

The Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref