Preferred Language
Articles
/
4BiRlJgBVTCNdQwCK7-C
Synthesis, characterization and anticancer activity in vitro evaluation of novel dicyanoaurate (I)-based complexes
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Performance evaluation of sewage treatment plant for Abu Ghraib Dairy Factory, Iraq
...Show More Authors

The objective of this study is to verify the overall performance and evaluate the wastewater quality of the wastewater treatment plant at the Abu Ghraib Dairy Factory and compare the results with the Iraqi Quality Standards (IQS) for effluent disposal and with the national determinants of treated water use. Agricultural irrigation wastewater, which included daily assessment records of the main parameters affecting wastewater [five-day biochemical oxygen demand (BOD5), chemical oxygen demand (COD), total dissolved solids (T.D.S), total suspended solids (TSS), phosphate (PO4), nitrate (NO3), hydrogen ion concentration (pH)] obtained from the quality control department of Abu Ghraib dairy plant registered from January 2017 to December 2020. Th

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Evaluation of Job-Mix Formula Tolerances as Related to Asphalt Mixtures Properties
...Show More Authors

The current Iraqi standard specifications for roads and bridges allowed the prepared Job-Mix Formula for asphalt mixtures to witness some tolerances with regard to the following: coarse aggregate gradation by ± 6.0 %, fine aggregate gradation by ± 4.0 %, filler gradation by ± 2.0 %, asphalt cement content by ± 0.3 % and mixing temperature by ± 15 oC. The objective of this work is to evaluate the behavior of asphalt mixtures prepared by different aggregates gradations (12.5 mm nominal maximum size) that fabricated by several asphalt contents (40-50 grade) and various mixing temperature. All the tolerances specified in the specifications are taken into account, furthermore, the zones beyond these tolerances

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 28 2019
Journal Name
Civil Engineering Journal
Evaluation the Moisture Susceptibility of Asphalt Mixtures Containing Demolished Concrete Waste Materials
...Show More Authors

The distress of moisture induced damage in flexible pavement received tremendous attention over the past decades. The harmful effects of this distress expand the deterioration of other known distresses such as rutting and fatigue cracking. This paper focused on the efficiency of using the waste material of demolished concrete to prepare asphalt mixtures that can withstand the effect of moisture in the pavement. For this purpose, different percentages of waste demolished concrete (0, 10, 20, 30, 50, 70 and 100) were embedded as a replacement for coarse aggregate to construct the base course. The optimum asphalt contents were determined depending on the Marshall method. Then after, two parameters were founded to evaluate the moisture

... Show More
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Practice Periodical On Structural Design And Construction
Reducing Damages to Underground Infrastructure: Performance Evaluation of One-Call Notification Program
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Apr 05 2021
Journal Name
Kuwait Journal Of Science
Evaluation of the Injana claystone from Central Iraq for the brick industry
...Show More Authors

This study aims to suggest an alternative to the use of quality agricultural soil in the brick industry (Iraq). The Late Miocene claystone bed in the Injana Formation in central Iraq was targeted through the study of 18 exposed sections that were sampled by using the trench sampling method. The claystones are characterized by quartz (36.4%) followed by calcite (32.8%), quartz (36.4%) feldspar (2.6%), gypsum (1.3%) and dolomite (0.7%), kaolinite (10.5%), illite (7.7%), chlorite (6.7%), palygorskite (6.0%) and montmorillonite (0.7%). New thermal mineral phases were formed at 950°C, including diopside (62.9%), quartz (18.4%), wollastonite (8.28%), akermanite (7.6%), Anorthite (6.25%), Nosean (4.9%), gehlenite (3.75%) and Lazurite (3.1

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
Virtual Performance Evaluation of Net-Zero Energy Building (NZEB) Using BIM Analysis
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Evaluation of a fire safety risk prediction model for an existing building
...Show More Authors
Abstract<p>Fire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA20</p> ... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref