Preferred Language
Articles
/
LRcbzo0BVTCNdQwCoRwv
Efficient approach for solving high order (2+1)D-differential equation
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
THE EFFICIENCY OF GUM-SILICA CMPOSITE FOR REMOVING OF WASTEWATER TURBIDITY
...Show More Authors

A novel mixed natural coagulant has been developed to remove sewage pollutants and heavy metals from Qanat- al- Jayesh by using low cost adsorbent natural materials. In these materials, significant interaction contains Arabic gum mixed with extracted silica from rice husk ash (natural coagulants) by the Batch device approach, using two variables, pH values ranging from 5-8 and contact times between 0.25-5 hrs. All wastewater samples were collected after treatment by adsorbents and examined for determination of residual heavy metal concentrations: Pb, Ni, Zn and Cu by atomic absorption spectroscopy (AAS), turbidity, pH, total dissolved salts (TDS), electrical conductivity (EC) and total salinity (TS). The results obtained indicate Th

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Cathodic Protection for Above Ground Storage Tank Bottom Using Data Acquisition
...Show More Authors

Impressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.

In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Iraqi Journal Of Laser
Reconstruction of 3D Shape for an Object using Laser Scanning Triangulation
...Show More Authors

This paper presents a method of designing and constructing a system capable of acquiring
the third dimension and reconstructs a 3D shape for an object from multi images of that object using
the principle of active optical triangulation. The system consists of an illumination source, a photo
detector, a movement mechanism and a PC, which is working as a controlling unit for the hard ware
components and as an image processing unit for the object multi view raw images which must be
processed to extract the third dimension. The result showed that the optical triangulation method
provides a rapid mean for obtaining accurate and quantitative distance measurements. The final
result's analysis refers to the necessity of usin

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Journal Of Theoretical And Applied Information Technology
CHOOSING THE RIGHT CHAOTIC MAP FOR IMAGE ENCRYPTION: A DETAILED EXAMINATION
...Show More Authors

This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Wed Sep 18 2024
Journal Name
Karbala International Journal Of Modern Science
Synthesis of ZnO: ZrO2 Nanocomposites Using Green Method for Medical Applications
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Distortion And Its Relationship of Parenting Reinforcement For Kindergarten Children
...Show More Authors

This research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.                         

After ensuring the validity and reliability of the two research tools and their suitabi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
"Social affiliation and its relation with compliance for Iraqi expatriates students"
...Show More Authors

Individual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of  psychological stability.

       Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.

     &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Iron Permeable Reactive Barrier for Removal of Lead from Contaminated Groundwater
...Show More Authors

The possibility of using zero-valent iron as permeable reactive barrier in removing lead from a contaminated groundwater was investigated. In the batch tests, the effects of many parameters such as contact time between adsorbate and adsorbent (0-240 min), initial pH of the solution (4-8), sorbent dosage (1-12 g/100 mL), initial metal concentration (50-250 mg/L), and agitation speed
(0-250 rpm) were studied. The results proved that the best values of these parameters achieve the maximum removal efficiency of Pb+2 (=97%) were 2 hr, 5, 5 g/100 mL, 50 mg/L and 200 rpm respectively. The sorption data of Pb+2 ions on the zero-valent iron have been performed well by Langmuir isotherm model in compared with Freundlich model under the studied

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Offshore Technology Conference Asia
Nanofluids for Enhanced Oil Recovery Processes: Wettability Alteration Using Zirconium Oxide
...Show More Authors

Ultimate oil recovery and displacement efficiency at the pore-scale are controlled by the rock wettability thus there is a growing interest in the wetting behaviour of reservoir rocks as production from fractured oil-wet or mixed-wet limestone formations have remained a key challenge. Conventional waterflooding methods are inefficient in such formation due to poor spontaneous imbibition of water into the oil-wet rock capillaries. However, altering the wettability to water-wet could yield recovery of significant amounts of additional oil thus this study investigates the influence of nanoparticles on wettability alteration. The efficiency of various formulated zirconium-oxide (ZrO2) based nanofluids at different nanoparticle concentrations (0

... Show More
Scopus (49)
Crossref (37)
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (7)
Crossref