Preferred Language
Articles
/
fxZsuosBVTCNdQwCs9hr
Study of the qualitative characteristics of oils derived from fish waste running Asian Silurus triostequs and use of organic solvents in certain food systems
...Show More Authors

View Publication
Publication Date
Wed Mar 13 2019
Journal Name
Al-khwarizmi Engineering Journal
Transient Behavior Analysis for Solar Energy Storage in PCM-CFM Material Using Equivalent Heat Capacity Method as Storage Model
...Show More Authors

A paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Heliyon
Treatment of hospital wastewater by anodic oxidation using a new approach made by combining rotation with pulsed electric current on Cu-SnO2–Sb2O5 rotating cylinder anode
...Show More Authors

View Publication
Scopus (1)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Diyala Journal For Pure Sciences
Synthesis, Characterization and Biological Activity for Complexes VO(II), Mn(II), Co(II) and Ni(II) With New Multidentate Ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4- ylimino)acetic Acid][H2L] type (N2).
...Show More Authors

In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon

... Show More
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Synchronous Buck Converter with Perturb and Observe Maximum Power Point Tracking Implemented on a Low-Cost Arduino-microcontroller
...Show More Authors

Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
Engineering Analysis With Boundary Elements
Radial integration boundary integral and integro-differential equation methods for two-dimensional heat conduction problems with variable coefficients
...Show More Authors

View Publication
Crossref (33)
Crossref
Publication Date
Mon Nov 15 2021
Journal Name
Aip Conference Proceedings
Oil skimming followed by coagulation/flocculation processes for oilfield produced water treatment and zero liquid discharge system application
...Show More Authors

The study focused on the treatment of real oilfield produced water from the East Baghdad field affiliated to the Midland Oil Company (Iraq) using an oil skimming process followed by a coagulation/flocculation process for zero liquid discharge system applications. Belt type oil skimmer was utilized for evaluating the process efficiency with various operating conditions such as temperature (17-40 °C) and time (0.5-2.5 hr.). Polyaluminum chloride (PAC) coagulant and polyacrylamide (PAM) flocculant was used to investigate the performance of the coagulation/flocculation process with PAC dosage (5-90 ppm) and pH (5-10) as operating conditions. In the skimming process, the oil content, COD, turbidity, and TSS decreased with an increase in tempera

... Show More
View Publication