Preferred Language
Articles
/
6BYdRokBVTCNdQwC54cG
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

Crossref
View Publication
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Preparation of nano-microfibers with a different polymers
...Show More Authors

In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.

View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Anbar Journal Of Agricultural Sciences
EFFECT OF ACIDS AND ORGANIC NUTRIENTS ON CAULIFLOWER GROWTH AND YIELD AND WATER USE EFFICIENCY AND FERTILIZER PRODUCTIVITY OF A MODIFIED NFT HYDROPONICS SYSTEM
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Appropriate for Use Under Advanced Manu Facturing Technology: An Application in Baghdad Soft Drinks Company " Private Contribution
...Show More Authors

Big developments in technology have led to upset the balance of ideas, given of its own post new properties for products not provided by traditional technology, especially economic units operating within the industrial sector, and therefore it is important to develop the Iraqi industrial sector and interest to do its vital role in light Of progress technological.The research aims to Find the use of advanced manufacturing technologies that lead to customized production and quality appropriate whether they are low quality and low cost or low cost and suitable quality or high quality and high cost to win customer satisfaction.While the important conclusions is that the application of advanced manufacturing technology is not limited to techn

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Use of chickpea soaking water in dough fermentation and its effect on quality properties of loaf bread
...Show More Authors

This study was carried out to investigate the possibility of chickpea soaked water as a substitute for yeast in dough fermentation and its effects on sensory properties of the laboratory loaf bread. Chickpea was soaked for 24,48 and 72 hours at room temperature and used in proportion with or without yeast in dough fermentation . The results revealed that , as the percentage of soaked chickpea water substitution increased, the volume of the produced loaf bread decreased as compared with the control treatment (only yeast ).Best results were obtained by using soaked chickpea water for 24 hours in proportion of 1:1 soaked chickpea water : yeast regarding the sensory properties ,volume and leavening of the loaf bread.
Keywords: chickpea so

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Carbohydrate Polymers
Synthesis, characterization of acrylamide grafted chitosan and its use in removal of copper(II) ions from water
...Show More Authors

View Publication
Scopus (107)
Crossref (97)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Building Engineering
Technologies for safety and health management in construction: Current use, implementation benefits and limitations, and adoption barriers
...Show More Authors

View Publication
Scopus (218)
Crossref (173)
Scopus Clarivate Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis, Characterization of Nickel Cobaltite Nanoparticles and Its Use in Removal Methyl Green Dye from Aqueous Solution
...Show More Authors

In this study, nickel cobaltite (NC) nanoparticles were created using the sol-gel process and used as an adsorbent to adsorb methyl green dye (MG) from aqueous solutions. The adequate preparation of nickel cobaltite nanoparticles was verified using FT-IR, SEM, and X-ray diffraction (XRD) studies. The crystalline particle size of NC nanoparticles was 10.53 nm. The effects of a number of experimental variables, such as temperature, adsorbent dosage, and contact time, were examined. The optimal contact time and adsorbent dosage were 120 minutes and 4.5 mg/L, respectively. Four kinetic models—an intraparticle diffusion, a pseudo-first-order equation, a pseudo-second-order equation, and the Boyd equation—were employed to monitor the adsorpti

... Show More
Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref