Preferred Language
Articles
/
joe-37
Estimation Curve Numbers using GIS and Hec-GeoHMS Model
...Show More Authors

Recently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevation Model (DEM), land use layer (LU), “Look–Up tables” and other layers resulted from running the software.  Curve Number which expresses a catchment’s response to a storm event has been estimated in this study to each land parcel based on LU layer and soil layer within each parcel.  The results showed that a CN of 100 (dark Blue) means surface water. The high curve numbers (100 -81) (Blue and light Blue) corresponding to urbanized areas means high runoff and low infiltration; whereas low curve numbers (77- 58) (Brown and light Brown) corresponding to the forested area means low runoff and high infiltration. Four classes of land cover have been identified; these are surface water, medium residential, forest and agriculture. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 19 2026
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 15 2020
Journal Name
Journal Of Petroleum Research And Studies
Reservoir Model and Production Strategy of Mishrif Reservoir-Nasryia Oil Field Southern Iraq
...Show More Authors

Nasryia oil field is located about 38 Km to the north-west of Nasryia city. The field was discovered in 1975 after doing seismic by Iraqi national oil company. Mishrif formation is a carbonate rock (Limestone and Dolomite) and its thickness reach to 170m. The main reservoir is the lower Mishrif (MB) layer which has medium permeability (3.5-100) md and good porosity (10-25) %. Form well logging interpretation, it has been confirmed the rock type of Mishrif formation as carbonate rock. A ten meter shale layer is separating the MA from MB layer. Environmental corrections had been applied on well logs to use the corrected one in the analysis. The combination of Neutron-Density porosity has been chosen for interpretation as it is c

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
The Effect of Combination Ovariectomy and D-galactose Administration on Alzheimer's Animal Model
...Show More Authors

Background and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref