Preferred Language
Articles
/
joe-1318
Evaluation of Using Magnetized Water in Leaching Salts in Sandy Loam Soil
...Show More Authors

Many studies and researchers have reported significant evidence that some physical properties of water can be changed as it passes through a magnetic field that can improve water use.  This can have a promising potential for applications, especially in the fields of irrigation and drainage. In this research, magnetized water was used to leach salt-affected sandy loam soil. A test rig was designed and constructed to investigate the effects of magnetized water on leaching soil. The rig consists of a magnetization device that can provide variable intensity. Water was supplied from a constant head reservoir to the magnetization device then to the soils that were placed in plastic columns. Five different magnetic intensities and five different times of exposing the flow of water to the magnetic field were applied. The time of exposure to the magnetic field was represented by the flow velocity of the flow passing through the magnetic field. The treated water is applied to leach each soil column in three consecutive leaching processes. Leaching water drained from the soil samples were tested for EC and pH, K+, Na+, Mg+2, Ca+2, Cl-, HCO-3, and SO4-2. The results showed that the efficiency of magnetized water in removing salts from the soil is more than the untreated water. As the magnetic intensity and exposure time are increased, more salts were leached out of the soil. When comparing the experiments conducted with magnetized water with that untreated water, the maximum increase in the EC value was 58.6%, and in the pH values was of 2.4%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Optimization of Dye Removal Using Waste Natural Material and Polymer Particles
...Show More Authors

In this paper waste natural material (date seed) and polymer particles(UF) were used for investigation of  removal dye of the potassium permanganate. Also study effect some variables such as pH, dye concentration and adsorbent concentration on dye removal. 15 experimental runs were done using  the itemized conditions designed established on the Box-Wilson design employed to optimize dye removal. The optimum conditions for the dye removal were found: (pH) 12, (dye con.) 2.38 ppm, (adsorbant con.) 0.0816 gm for date seed with 95.22% removal and for UF (pH) 12, (dye con.) 18 ppm, (adsorbant con.) 0.2235 gm with 91.43%. The value of R-square was 85.47%  for Date seed  and (88.77%) for UF.

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Results In Engineering
Storage characteristics of solar thermal collector integrated with latent heat material: A comparative experimental study of two types of paraffin wax under varying incident radiation and different water flow rates
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Fuzzy-assignment Model by Using Linguistic Variables
...Show More Authors

      This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Hematological Study of Infants Amoebiasis in Duhok City
...Show More Authors

Out of 180 children, 60 (33.3%) have Amoebiasis infection as diagnosed by direct wet smear and Saturated Salt Solution (SSS). SSS method is more significant (P=0.001) in diagnosis of the disease. Number of children infected with Amoebiasis infection is higher in infants aged 1-6 months, but without any significant difference to ages 6-12 or 12-18 months. In contrast, infants aged 18-24 months are significantly differant (P=0.01) as the infection rate is 16.6%. Gender also is seen to be reduced in significance (P= 0.001) for females aged 18-24 months. Blood profile of the involved infants has shown a significant variation (P=0. 01) for all blood profile parameters (RBC (P=0.05), WBC (P=0.001), Lymphocytes (P=0.05), Granulated WBC (P=0.05),

... Show More
View Publication Preview PDF
Scopus Crossref