Preferred Language
Articles
/
qBauGIcBVTCNdQwCOzZX
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive condition inspection data for measuring the waiting times of the pipes at each condition class.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 24 2020
Journal Name
Modeling Earth Systems And Environment
Assessment of reservoir properties and Buckles model for Rumaila Formation in Ahdeb oil field, Central Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Semi – Bounded Modules
...Show More Authors

Let R be a commutative ring with identity, and let M be a unity R-module. M is called a bounded R-module provided that there exists an element x?M such that annR(M) = annR(x). As a generalization of this concept, a concept of semi-bounded module has been introduced as follows: M is called a semi-bounded if there exists an element x?M such that . In this paper, some properties and characterizations of semi-bounded modules are given. Also, various basic results about semi-bounded modules are considered. Moreover, some relations between semi-bounded modules and other types of modules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
A Nonlinear MIMO-PID Neural Controller Design for Vehicle Lateral Dynamics model based on Modified Elman Neural Network
...Show More Authors

This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of The Association Of Arab Universities For Basic And Applied Sciences
Semi-analytical method for solving Fokker-Planck’s equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sun Sep 26 2021
Journal Name
Modern Sport
Effect of Rehabilitation Program by Using Hypermedia on Treatment Some of Shoulder Tissues Injuries for Badminton Players
...Show More Authors

The important of present study is to design rehabilitation program by using hypermedia for some injuries of smooth tissues in shoulder joint.   This joint is most important to help badminton players in achieving their daily and sport tasks due to upper limp movements depend on health and active of this joint. Experimental approach with a manner of equal single station was used in present study and study simple consisted of 6 badminton players from Babylon and Al-Mahaweel clubs who have less sharp tissue smooth injury such (muscles, ligaments, pocket). We used (SPSS) to analyses pre, medal, post-tests data. In conclusion, hypermedia is positive benefit to rehabilitee of injuries of smooth tissues in shoulder joint for badminton pla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2009
Journal Name
Journal Of Engineering
THE EFFECT OF OPERATING CONDITION FOR CUMENE CRACKING ON THE PERFORMANCE OF PREPARED HX - ZEOLITE CATALYST
...Show More Authors

The present study reports the effect of temperature and liquid hourly space velocity (LHSV) on the cumene cracking reaction rate and selectivity by using a laboratory continuous flow unit with fixed bed reactor operating at atmospheric pressure. The prepared HX zeolite was made from Iraqi kaolin with good crystallinity .The activity and selectivity of prepared HX-zeolite was compared with standard HY zeolite and HX zeolite catalysts in the temperature range of 673-823K and LHSV of 0.7-2.5 h-1 . It was found that the cumene conversion increases with increasing temperature and decreasing LHSV at 823K and LHSV of 0.7 h-1 the conversions 65.32, 42.88 and 59.42 mol% for HY, HX and prepared HX catalysts respectively and at LHSV of 2.5 h-1 and th

... Show More
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of applying the CAMELS banking assessment model asa control tool On Iraqi private commercial banks for the period 2016 -2020
...Show More Authors

The banking sector is currently facing great challenges resulting from intense competition in the financial environment, and this is what makes the supreme audit bodies and the Central Bank audit as the highest supervisory authority on banks in order to achieve profit and not be exposed to loss, and this requires identifying the banking strengths and risks that constitute points Weakness that affects the future performance and the life of the bank, which requires special supervisory care, and from this point of view, the research aims to use the CAMELS model as a control tool in banks, through the use of its six indicators: capital adequacy, asset quality, management quality, profits, liquidity And sensitivity to market risks, th

... Show More
View Publication Preview PDF