Preferred Language
Articles
/
joe-762
Design of Expert System for Managing the System of AthTharthar Lake
...Show More Authors

The operation and management of water resources projects have direct and significant effects on the optimum use of water. Artificial intelligence techniques are a new tool used to help in making optimized decisions, based on knowledge bases in the planning, implementation, operation and management of projects as well as controlling flowing water quantities to prevent flooding and storage of excess water and use it during drought.

 In this research, an Expert System was designed for operating and managing the system of AthTharthar Lake (ESSTAR). It was applied for all expected conditions of flow, including the cases of   drought, normal flow, and during floods. Moreover, the cases of hypothetical operating of flow under extreme conditions were considered. The results showed a good capability of the designed expert system to operate the potential cases for those discharges and with high efficiency. Also the results showed the inability of AthTharthar Lake System to pass the discharge up to 12600 m3/s during floods. It was recommended to accomplish Tigris River training and increasing the level of levees, reshaping the cross-sections and longitudinal section of the river. It was suggested to expanded AthTharthar Head Regulator and the intake canal to accommodate more flood discharges.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Measurement of Impact of Banking System Development on Economic Growth in Iraq
...Show More Authors

At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Oct 12 1995
Journal Name
International Journal Of Environmental Studies
ON THE SPATIAL AND SEASONAL VARIATIONS OF HEAVY METALS OF THE RAZZAZAH LAKE, IRAQ
...Show More Authors

Five heavy metals, namely Cd, Cu, Fe, Mn, and Pb in the surface water and through the water column were studied at 10 selected stations in the Razzazah lake and Karbala drainage canal for the period between November 1990 to October 1991*. pH and total hardness were also measured. Lead was found to be the highest in concentration as overall average values, followed by an manganese, iron, copper then cadmium at the surface as well as along the water column. All the studied metals were below or close to the maximum allowed limits of Iraqi standards for inland water. The spatial and seasonal variations were discussed.

Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Field Study of Novel Storage Tank of Solar Water Heating System
...Show More Authors

In this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri May 15 2026
Journal Name
Journal Of Physical Education
The impact of a training field in Lake Al-Razzaza to develop the strength of the legs and arms for young boxers
...Show More Authors

View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Characterization of Magnetized-Plasma System Induced by Laser
...Show More Authors

  This study investigated the effect of applying an external magnetic field on the characteristics of laser-induced plasma, such as its parameters plasma, magnetization properties, emission line intensities, and plasma coefficients, for plasma induced from zinc oxide: aluminum composite (ZO:AL) at an atomic ratio of 0.3 %. Plasma properties include magnetization and emission line intensities. The excitation was done by a pulsed laser of Nd:YAG with 400 mJ energy at atmospheric pressure. Both the electron temperature and number density were determined with the help of the Stark effect principle and the Boltzmann-Plot method. There was a rise in the amount of (ne) and (Te) that was produced

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Control System Development of Cap-Seal Assembling Machine
...Show More Authors

   

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Crossref