Preferred Language
Articles
/
WBZTyosBVTCNdQwCfd9d
Communicational sources used by the agricultural agent to transfer agricultural infromation for rice farmers in Alabbassia / Najaf Al-Ashraf Governorate
...Show More Authors

Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Pyrolysis of scrap tire by utilizing zeolite as catalyst
...Show More Authors

View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Strength Improvement of Clay Soil by Using Stone Powder
...Show More Authors

Soil stabilization with stone powder is a good solution for the construction of subgrade for road way and railway lines, especially under the platforms and mostly in transition zones between embankments and rigid structures, where the mechanical properties of supporting soils are very influential. Stone powder often has a unique composition which justifies the need for research to study the feasibility of using this stone powder type for ground improvement applications. This paper presents results from a comprehensive laboratory study carried out to investigate the feasibility of using stone powder for improvement of engineering properties of clays.

The stone powder contains bassanite (CaSO4. ½ H

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Postgraduate Medical Journal
Salvage of Extruded Cochlear Implant By Interposing Pericranial Flap
...Show More Authors

BACKGROUND: Cochlear implant has become a routine procedure for management of severe sensorineural hearing loss. Cochlear implant extrusion is one of the most devastating complication of this procedure. A double layer closure of pericranial flap and scalp rotational flap has being showed to decrease the rate of late implant extrusion.OBJECTIVE:The purpose of this study is to evaluate the use of the pericranial flap as second layer coverage after cochlear implant extrusion.PATIENTS AND METHODS:Eight patients with cochlear implant extrusion in Al-Shaheed Gazi Al-Hariri hospital were operated on by using two layer closure ; the pericranial flap as salvage layer used to cover the cochlear implant and scalp rotational flap as a routine coverage,

... Show More
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung
...Show More Authors

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

View Publication
Scopus (26)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reduction of Aromatic Content from Hexane by Silica Gel
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Dec 19 2024
Journal Name
Al-rafidain J Med Sci
Assessment of High Risk Pregnant Women by Fetal Echocardiography
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Competitive Adsorption of Three Reactive Dyes by Activated Carbon
...Show More Authors

In this study three reactive dyes (blue B, red R and yellow Y) in single , binary and ternary solution were adsorbed by activated carbon AC in equilibrium and kinetic experiments. Surface area, Bulk and real density, and porosity were carried out for the activated carbon.
Batch Experiments of pH (2.5-8.5) and initial concentration (5-100) mg/l were carried out for single solution for each dye. Experiments of adsorbent dosage effect (0.1-1)g per 100 ml were studied as a variable to evaluate uptake% and adsorption capacity for single dyes(5, 10) ppm, binary and ternary (10) ppm of mixture solutions solution of dyes. Langmuir, and Freundlich, models were used as Equilibrium isotherm models for single solution. Extended Langmuir and Freun

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref