Preferred Language
Articles
/
qBiEkZgBVTCNdQwCf78S
Purification and activation of the Iraqi bentonite for edible oil Production
...Show More Authors
Abstract<p>Samples of Iraqi bentonitic sediments, representing local montmorillonite brought from Traifawi region near the Syrian border. Mineralogical the samples were characterized as low grade of Ca-smectite, particle size, chemical analysis, XRD, and BET surface area analyses of the samples were carried out to examine the structure of bentonite before and after acid activation. The goal is to prepare a bleaching earth for edible oil production. Iraqi Bentonite was beneficiated and activated by series of physical and chemical steps, using 4N & 6N concentration of hydrochloric acid and at a temperature of 70-80 ° C. Surface area and pore volume of the samples were determined to assess the bleaching power of the activated bentonite. The chemical composition of the bentonite improve after remove Calcite phase was disappeared, reduced Iron oxide percentage with Increasing the concentration of hydrochloric acid and the treatment time lead to the growth of Smectite phase and change the structural of bentonite which noticed by improve of surface area from 58.93 to 206.62 m<sup>2</sup>g<sup>−1</sup>.</p>
Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 15 2022
Journal Name
Revis Bionatura
ND2 Gene Sequencing of Sub fertile Patients Recovered from COVID-19 in Association with Toxoplasmosis
...Show More Authors

A total of (90) blood samples were collected from male patients infected with Toxoplasmosis who recovered from COVID- 19 and attended Kamal Alsamiraai Hospital from 15 January to 15 September 2021. We measured anti-Toxoplasma antibodies (IgG and IgM) detected by ELISA, whereas Anti-COVID-19 antibodies (IgG and IgM) were estimated using Elisa and Afilias. The semen characteristics were also studied among fertile, healthy individuals (control group) and sub-fertile patients. Results showed that the mean sperm count was high among the control group (40.5±1.3x 106/ml) compared with that of the sub-fertile patients (10.3±1.75 and 8.8±1.9 x 106/ml for oligozoospermia, and oligoasthenozoospermia respectively), and it was the highest (44.7±1.4

... Show More
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Numerical Analysis of Double Diffusive Laminar Natural Convection in a Right Angle Triangular Solar Collector
...Show More Authors

A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
International Medical Journal Vol. 28, Supplement No. 1, Pp. 46 - 48 , June 2021
Association of enamel defects with nutritional status among primary schools students in Al-Najaf city
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Mar 06 2026
Journal Name
Journal Of Baghdad College Of Dentistry
In vivo plaque count of Streptococcus Mutans around orthodontic brackets bonded with two different adhesives
...Show More Authors

Background: The prevention of the enamel demineralization at the periphery of the brackets is a significant challenge to orthodontic professionals. The aim of this clinical study was to compare the Streptococcus mutants count in the plaque surrounding two orthodontic adhesive types, Fuji Ortho LC and Enlight (Ormco). Materials and methods: A total of 13 patients (7 male and 6 female) needing fixed orthodontic appliance therapy were participated. A split mouth technique was followed with appliances bonded by two orthodontic adhesive types, Fuji Ortho LC and Enlight (Ormco). Saliva was collected before placement of appliances (T0) and again at three weeks (T1) and six weeks (T2) after placement of appliances. Plaque was collected from areas a

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Molecular Characterization of Potential Crop Pathogens Associated with Weeds as Endophytes in Uniilorin Plantations, Nigeria
...Show More Authors

Crop diseases are usually caused by inoculum of pathogens which might exist on alternate hosts or weeds as endophytes. These endophytes, cum pathogens, usually confer some beneficial attributes to these weeds or alternate hosts from protection against herbivores, disease resistance, stress tolerance to secondary metabolites production. This study was therefore carried out to isolate potential crop pathogens which exist as endophytes on weed species in the University of Ilorin plantations. Green asymptomatic leaves were collected from 10 weed species across the plantations, and processed for their endophytic fungi isolation. Isolates were purified into pure cultures and used for molecular identification using the internal transcribed spac

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
ORGANIZATION OF MEMORY CHIPS IN MEMORY SYSTEMS THAT HAVE WORD SIZE WIDER THAN 8-BIT
...Show More Authors

This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically.

Publication Date
Thu May 25 2017
Journal Name
Genome Announcements
Complete Genome Sequence of Lytic Bacteriophage VPUSM 8 against O1 El Tor Inaba Vibrio cholerae
...Show More Authors
ABSTRACT<p> The complete genome sequence of bacteriophage VPUSM 8 against O1 El Tor Inaba <named-content content-type="genus-species">Vibrio cholerae</named-content> is reported here. The isolated VPUSM 8 has potential use in future phage therapy or as a biocontrol agent for the prevention and treatment of cholera. </p>
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Evaluation of Streptocin SH3, a Bacteriocin produced by Streptococcus sanguinis isolated from Human Dental Plaque
...Show More Authors

Background: Bacteriocin is a peptidic toxin has many advantages to bacteria in their ecological niche and has strong antibacterial activity. Objective: The aim of this study was to evaluation of bacteriocin using Streptococcus sanguinis isolated from human dental caries.

Subjects and Methods: Thirty five streptococcus isolates were diagnosed and tested for their production of bacteriocin, and then the optimal conditions for production of bacteriocin were determined.  After that, the purification of bacteriocin was made partially by ammonium sulfate at 95% saturation levels, followed by and gel filtration chromatography

... Show More
View Publication Preview PDF
Crossref