Preferred Language
Articles
/
joe-807
Current and Modified Flood Discharge Capacity of a Reach of Tigris River between Kut and Amarah Barrages
...Show More Authors

This study was conducted to examine the discharge capacity of the reach of the Tigris River between Kut and Amarah Barrages of 250km in length. The examination includes simulation the current capacity of the reach by using HEC-RAS model. 247cross sections surveyed in 2012 were used in the simulation. The model was calibrated using observed discharges of 533, 800, 1025 and 3000m3/s discharged at Kut Barrage during 2013, 1995, 1995 and 1988, respectively, and its related water level at three gauge stations located along the reach. The result of calibration process indicated that the lowest Root Mean Square Error of 0.095 can be obtained when using Manning’s n coefficient of 0.026, 0.03 for the Kut- Ali Al Garbi and Ali Al Garbi- Amarah reaches respectively, and 0.03 for the flood plain of the whole reach under study. The reach under study has two lateral inflow streams, UmAljury, which joins Tigris River at station 51km, and Aljabab, which joins Tigris River at station 57km. The discharge of Aljabab varies between 0 and 400m3/s and the discharge of UmAljury varies between 0 and 50m3/s.                     The results showed that the current capacity of the main channel of the reach of the Tigris River between Kut and Amarah Barrages is 400m3/s. The water levels kept less 1m than both levees in case of discharging 1800m3/s from Kut Barrage, with no lateral inflows, and 1700m3/s with lateral inflow. The reach of Tigris River fails to accommodate the flood discharge of 3300m3/s which is the discharge of the flood of 1988 measured at Kut Barage. It can be concluded that the reach had large amount of sediment for the period from 1988 to 2012 and the reach capacity reduced to about half its capacity of 1988 during this period.                                                          The results of removing 12 islands and 2 sidebars by reshaping the current condition into trapezoidal cross-section will decrease the surface water levels by 20cm and flow of 1900m3/s can be discharged safely at Kut Barrage without any lateral inflow and 1800m3/s with lateral inflow from the tributaries. While, expand 58 narrow cross-sections that choking the flow, the water levels along the reach are lowered by an average of 20cm in addition to that 20cm when modifying the cross-sections at the islands and sidebars. In this case, flow of 2100m3/s can safely be discharged from Kut Barrage without any lateral inflow and 1900m3/s with lateral inflow. The result when modifying additional 111 cross-sections showed that the reach can safely accommodate a flood wave of 3300m3/s from Kut Barrage without any lateral inflow and 3000m3/s with lateral inflow.                                                                                                            

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Volumetric Mass Transfer Capacity Coefficient in the RTL Extractor
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
A Modified Approach by Using Prediction to Build a Best Threshold in ARX Model with Practical Application
...Show More Authors

The proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.

In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu May 12 2011
Journal Name
Iraqi Journal Of Medical Science
A comparative study between the side effects of copper intrauterine device in women with non-scarred and scarred uterus
...Show More Authors

Publication Date
Thu Aug 17 2023
Journal Name
Migration Letters
Employing the Teleological-Causal Presumption between Al-Khwarizmi and Ibn Yaish’s Explanations of Al-Mufasal (even) as a Model
...Show More Authors

It is a moral presumption that includes the object for its sake, and it is called the object for it or the object for its sake, which is the present tense after (lam, ki, fa, willn, and then), and it is not an excuse for the occurrence of the matter (1), and it requires a connection between the two sides of (a cause with a cause) united by a reason for a specific purpose (2). The object has a reason or an excuse, because it is an explanation of what came before it, of the cause. The reason for the occurrence of the action, being the motive for causing the action and the bearer of it (3), indicates that the infinitive is restricted to a special reason. So if I said: (I came to you with the hope of honoring you), then I attributed the coming

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More
Publication Date
Thu Mar 25 1993
Journal Name
كلية العلوم. / جامعة بغداد
ISOLATION AND CHARACTERIZATION OF EXTREMELY HALOPHILIC BACTERIA FROM SADDAM RIVER REGIONS AND THE RULE OF MEMBRANE PROTEINS IN THE RESISTANCE TO HIGH SALINITY
...Show More Authors

This study included isolation and characterization of extremely halophilic bacteria from Al-Massab Al-Aam region in South of Iraq Fifty isolates were identified by using numerical taxonomy 40 strains belonged to the genus Halobacterium which inclucted Hb. halobium Hb. cutirubrum Hb. salinarium Hb. saccharovorum Hb. valismortis and Hb. volcanii. Ten strains belonged to the genus Halococcus which included Hc. morrhuae Hc. saccharolyticus. Growth curves were sensitive mutants determined for wild type and salt Generation time in logarthmic phase was measured and found to be (10.37 2hr 7 0.59) for Hb. salinarium / 18 (6.490 hr 0.24) for Hb. cutirubrum / 32, (6.700 hr + 0.488) for Hb. valismortis / 20, (11.243 hr + 0.96) for Hb. volcanii / 7. (7

... Show More
Publication Date
Fri May 05 2023
Journal Name
Journal Of Population Therapeutics And Clinical Pharmacology
The Association Between -697C>G and -997G>A polymorphism of the HTR2C Gene and the Metabolic Syndrome in Iraqi Schizophrenic Patients
...Show More Authors

View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Thu Dec 16 2021
Journal Name
Open Access Macedonian Journal Of Medical Sciences
A Comparative Study of Pediatric Fracture Shaft Femur Fixating by Plate and Screws Using Lateral Approach Between Subvastus Lateralis and Transvastus Lateralis Outcome
...Show More Authors

BACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the pa

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Archives Of Polish Fisheries
Meristic character variability among populations of Silurus triostegus Heckel, 1843 from the Euphrates, Tigris, and Shatt al-Arab Rivers, Iraq
...Show More Authors
Abstract<p>Variation in the numbers of pectoral fin spines and rays, pelvic fin rays, gill rakers on the first gill arch, anal fin rays, and the number of vertebrae of Silurus triostegus Heckel were examined in specimens from 16 localities that span its entire distribution range in the Tigris, Euphrates, and Shatt al-Arab rivers in Iraq. The mean number of the six meristic traits increases toward high latitudes with maximum and minimum values in the north and south of Iraq. Based on cluster analysis and PCA, the Mesopotamian river samples were clearly separated into three distinct groups. The upper Tigris populations were isolated from those of the middle and southern populations of this river and from those of</p> ... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus