Baghdad Metro is a vital project to fulfill the rapidly increased traffic volume requirements. The proposed metro will connect both sides of Baghdad City, passing under the Tigris River. This study is employed finite elements software (PLAXIS 3D) to evaluate the seepage force developed around the sub-river segment during different construction stages and for other water levels of Tigris. The study found that when the water level changes from maximum to minimum, the developed seepage force decreases by (8 to 13%) and (22 to 27%) respectively. The seepage forces were found to be maximum during the excavation stage. The concrete lining process led to a noticeable reduction in seepage forces at all locations. The study also implemented the strength reduction theory to assess the overall stability of the tunnel. The study shows that the overall stability factor was minimum during the concrete lining process. As the water level decreased, the overall stability factor increased by (5% - 8%).
Earth dams in regions with moderate to high seismic activity are crucial for protecting downstream communities. Iraq and its neighboring areas have seen recurrent seismic activity, notably the 2017 Halabja Earthquake, which potentially compromised the integrity of the existing earth dam. The Darbandikhan Dam, affected by an earthquake, has inadequacies in its crest and downstream slope, presenting a greater danger of significant earthquake-induced damage compared to cyclic shocks. Consequently, evaluating the dam's safety is essential for safeguarding downstream residents and identifying optimal ways to avert slope stability failure amid recurrent seismic activity. Iraq's seismicity map is being updated to reflect earthquake magni
... Show MoreThe issue of peaceful coexistence between societies is the topic of the hour, as it is one of the important issues in this era, especially in days when conflicts and conflicts abound, and even wars in the name of religion, gender, race, language, and the like. The world, so that single-mindedness and adherence to one opinion and intolerance to it became the method of dialogue in our world today, as writing in the field of peaceful coexistence, peace-building, tolerance, pluralism, and acceptance of the other is one of the new fields of knowledge in Iraq in general and in Nineveh Governorate in particular, as peaceful coexistence is one of the basic needs And necessary for the presence of individuals in societies, and it requires the achi
... Show Moreإن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreIn this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreIn this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that