Preferred Language
Articles
/
joe-438
Using Spatial Videos, Google Earthtm and Geographic Information System to Dynamically Monitor Built Environment Changes In a Challenging Environment: Baghdad, Iraq.
...Show More Authors

Urban expansion and its environmental and safety effects are one of the critical information needed for future development planning, safety considerations and environmental management. This work used two methods to monitor urban expansion and it's environmental and safety effects, the first is based on Google Maps for the years 2002 and 2010, and the second was the usage of spatial videos for the year 2013. Although the usage of satellite images is critical to know and investigate the general situation and the total effects of the expansion on a large piece of area, but the Spatial videos do a very detailed fine scale investigation, site conditions regarding both environmental and safety cannot be easily distinguished from satellite images .Another advantage of spatial videos is new houses can be recognized and separated visually even if they are attached or derived from one house. This article shows that the working conditions for the workers do not comply with the standards especially their health and safety procedures.

Also the municipality services are at the lowest level because of all the debris left in the street , lack of regulation and law enforcement that protect the health of neighborhood residents. 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 26 2018
Journal Name
Oriental Journal Of Chemistry
Excess Molar Quantities of Binary Mixture of Dipropyl amine with Aliphatic Alcohols at 298.15 K
...Show More Authors

Refractive indices (nD), viscosities (η) and densities (r) were deliberated for the binary mixtures created by dipropyl amine with 1-octanol, 1-heptanol, 1-hexanol, 1-pentanol and tert-pentyl alcohol at temperature 298.15 K over the perfect installation extent. The function of Redlich-Kister were used to calculate and renovated of the refractive index deviations (∆nD), viscosity deviations (ηE), excess molar Gibbs free energy (∆G*E) and excess molar volumes(Vm E). The standard errors and coefficients were respected by this function. The values of ∆nD, ηE, Vm E and ∆G*E were plotted against mole fraction of dipropyl amine. In all cases the obtained ηE, ∆G*E, Vm E and ∆nD values were negative at 298.15K. Effect of carbon atoms

... Show More
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Solving the Inverse Kinematic Equations of Elastic Robot Arm Utilizing Neural Network
...Show More Authors

The inverse kinematic equation for a robot is very important to the control robot’s motion and position. The solving of this equation is complex for the rigid robot due to the dependency of this equation on the joint configuration and structure of robot link. In light robot arms, where the flexibility exists, the solving of this problem is more complicated than the rigid link robot because the deformation variables (elongation and bending) are present in the forward kinematic equation. The finding of an inverse kinematic equation needs to obtain the relation between the joint angles and both of the end-effector position and deformations variables. In this work, a neural network has been proposed to solve the problem of inverse kinemati

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Electrocoagulation for Treatment of Simulated Blowdown Water Of Cooling Tower
...Show More Authors

This study investigates the results of electrocoagulation (EC) using aluminum (Al) electrodes as anode and stainless steel (grade 316) as a cathode for removing silica, calcium, and magnesium ions from simulated cooling tower blowdown waters. The simulated water contains (50 mg/l silica, 508 mg/l calcium, and 292 mg/l magnesium). The influence of different experimental parameters, such as current density (0.5, 1, and 2 mA/cm2), initial pH(5,7, and 10), the temperature of the simulated solution(250C and 35 0C), and electrolysis time was studied. The highest removal efficiency of 80.183%, 99.21%, and 98.06% for calcium, silica, and magnesium ions, respectively, were obtained at a current de

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Dec 23 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
The antibacterial activity of indium oxide thin film prepared by thermal deposition
...Show More Authors

Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Materials Letters
Determination of third order susceptibility of carbon quantum dots at different concentrations
...Show More Authors

The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes