Preferred Language
Articles
/
-Re2QJMBVTCNdQwCs8_U
Carbon Sources and Riverine Algal Biomass: An Experimental Study
...Show More Authors

A lotic ecosystem is considered a source of carbon dioxide (CO2) in the atmosphere where it becomes supersaturated with CO2, which contributes to the global carbon cycle. To enhance our comprehension of the roles of CO2 in rivers, an outdoor experiment was designed with controlled carbon source inputs to investigate the roles of the dissolved organic carbon (DOC) and dissolved inorganic carbon (DIC) in the phytoplankton community. Plastic enclosures were installed in the Tigris River within Baghdad for that goal. Samples were collected on the first day, as well as on the 5th and the 12th days from 14 enclosures. The enclosures were treated by artificial glucose (C6H12O6) (10, 20, 30mg/ l) as DOC sources, while sodium bicarbonate (NaHCO3) (10, 20, 30μM) was used as a DIC source. The results showed that the concentration of nitrate (NO3 -) and phosphate (PO4 3-) changed over time and weren’t affected by the treatments. On the other hand pH, DOC, and CO2 concentrations were affected by treatments. Moreover, our results indicated that DOC and DIC treatments had a direct impact on phytoplankton biomass growth via increasing chlorophyll (Chl) concentration. Overall, it was concluded that different carbon sources (DOC and CO2) could be essential factors that shape river ecosystems function through influencing the base of food webs.

Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Thu Jun 15 2017
Journal Name
Arab World English Journal
An Assessment of Iraqi EFL Learners’ Performance in Using Synonymy and Antonymy
...Show More Authors

The knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (36)
Crossref (25)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of The Iraqi University
History, Identity, and Marginalization: An Analysis of Andrea Levy's (The Long Song)
...Show More Authors

Abstract The painful history of slavery has profoundly affected the identities and social interactions of Afro-Caribbean migrants, whose descendants continue to contend with prejudice and socio-economic marginalization. Andrea Levy's semi-autobiographical novel, The Long Song (2010), traces the turbulent history of Jamaica in the nineteenth century through the lens of Miss Kitty, a character based on Levy's great-great-great grandmother, who was born a slave on the plantation Amity in Saint Catherine's parish. The narrative blends the historical with the fictional and depicts various environmental contexts, inscribed meanings, and human exchanges, including the prominence of social situations perceived through race and class tensions ironic

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Removal of Copper from Simulated Wastewater by Applying Electromagnetic Adsorption for Locally Prepared Activated Carbon of Banana Peels
...Show More Authors

The adsorption of copper ions onto produced activated carbon from banana peels (with particle size 250 µm) in a single component system with applying magnetic field has been studied using fixed bed adsorber. The fixed bed breakthrough curves for the copper ions were investigated. The adsorption capacity for Cu (II) was investigated. It was found that 1) the exposure distance (E.D) and strength of magnetic field (B), affected the degree of adsorption; and 2) experiments showed that removal of Cu ions and accumulative adsorption capacity of adsorbent increase as the exposure distance and strength of magnetic field increase.
 

View Publication Preview PDF
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Inhibition Effect of Peach Juice on Corrosion of Low Carbon Steel in Hydrochloric Acid at Different Temperatures
...Show More Authors

The corrosion inhibition of low carbon steel in1N HCl solution in the presence of peach juice at temperature (30,40,50,and 60)°C at concentration ( 5, 10, 20, 30, 40and 50 cm3/L)were studied using weight loss and polarization techniques. Results show that the inhibition efficiency was increased with the increase of inhibitor concentration and increased with the increase of temperature up to 50ºC ,above 50ºC (i.e. at 60 ºC) the values of efficiency decreases. Activation parameters of the corrosion process such as activation energies, Ea, activation enthalpies, ΔH, and activation entropies, ΔS, were calculated. The adsorption of inhibitor follows Langmuir isotherm. Maximum inhibition efficiency obtained was a bout 91% at 50ºC in the

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 11 2017
Journal Name
Journal Of Engineering
Thermo Elastic Analysis of Carbon Nanotube-Reinforced Composite Cylinder Utilizing Finite Element Method with the Theory of Elasticity
...Show More Authors

  

View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Effect of Thickness Variable on the Bending Analysis of Rotating Functionally polymer Graded Carbon Nanotube Reinforced Cylindrical Panels
...Show More Authors

This study offers the elastic response of the variable thickness functionally graded (FG) by single walled carbon nanotubes reinforced composite (CNTRC) moderately thick cylindrical panels under rotating and transverse mechanical loadings. It’s considered that, three kinds of distributions of carbon nanotubes which are uniaxial aligned in the longitudinal direction and two functionally graded in the transverse direction of the cylindrical panels. Depending on first order shear deformation theory (FSDT), the governing equations can be derived. The partial differential equations are solved by utilizing the technique of finite element method (FEM) with a program has been built by using FORTRAN 95. The results are calculat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref