Preferred Language
Articles
/
6RbQAowBVTCNdQwCF_Xz
Determination the Wheat Weight and Volume: Mathematical Approach
...Show More Authors
Abstract<p>Grain size and shape are important yield indicators. A hint for reexamining the visual markers of grain weight can be found in the wheat grain width. A digital vernier caliper is used to measure length, width, and thickness. The data consisted of 1296 wheat grains, with measurements for each grain. In this data set, the average weight (We) of the twenty-four grains was measured and recorded. To determine measure of the length (L), width (W), thickness (T), weight (We), and volume(V). These features were manipulated to develop two mathematical models that were passed on to the multiple regression models. The results of the weight model demonstrated that the length and width of the grains were significantly different <italic>p < 0.0001</italic>. The coefficient of grain width was higher than that of grain length, indicating that grain width was more important than grain length. Furthermore, the overall model for volume was significantly different, (<italic>F</italic> <sub>(2,1295);</sub> =446832, <italic>p < 0.0001</italic>), regression(R<sup>2</sup>)-Square= 0.9986, Adj R-Sq=0.9986; and the RMSE of the experimental was RMSE=0.0002. The results of the weight model showed that the length, width, and thickness of the grains were significantly different <italic>p < 0.0001</italic>. The coefficient of grain the thickness was greater than the coefficient of grain length, indicating that the grain thickness was more significant than the grain length, and the coefficient of the grain width was more significant than the grain length. Moreover, the overall model for volume was significantly different (<italic>F</italic> <sub>(3,1295);</sub> =71809.6, <italic>p < 0.0001</italic>), regression (R<sup>2</sup>) and Adj-R-Sq = 0.9940 were equal, and RMES=0.3399. The introduced model may allow farmers to predict the weight and volume of wheat production during the wheat grain season, depending on the grain length, width, and thickness.</p>
Scopus Crossref
View Publication
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectrophotometric Determination of Rantidine-HCl in Pharmaceutical Formulations
...Show More Authors

Spectrophotometric  methods  were  developed   for    the determination of rantidine-HCl in pharmaceutical tablets. These methods were based on the reaction of DDQ and p-chloranil with rantidine-HCl, resulting in the formation of an orange-red and purple colored products which are quantified spectrophotometrically at 460 and 540nm in DDQ and p-chloranil, respectively. A graph of absorbance versus concentration show that Beer’s law is obeyed in a concentration ranges of 20-160 and (30-120)g/ml with molar absorptivities of 2.631 x 103 and 1.052 x 103l .mol-1-cm-1 for DDQ and  p-chloranil, respectively. The optimum conditions for  color development  are described and 

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Spectrophotmetric Micro determination of promrthazine hydrochloride in pharmaceutical
...Show More Authors

a simple accurate and sensitive spectrophotometric method for the determination of promethazine HCI has been developed the method is based on the oxidative coupling reaction of promethazine

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization of Chlropheniramine maleate– Molecularly Imprinted Polymers and Their Application as Sensors for the Determination of the Drug in Some Pharmaceutical Preparations
...Show More Authors

New chlropheniramine maleate (CPM) selective electrochemical membranes were prepared by using chlropheniramine maleate -molecularly imprinted polymers. MIP was prepared by bulk polymerization using 2-hydroxyethyl methacrylate (2-HEMA) as monomer, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and a benzoyl peroxide (BPO) as an initiator at 600C.  Three CPM-MIP electrodes were constructed by using tri-tolyl Phosphate (ToCP), tris (2- ethyl hexyl) Phosphate (TEHP) and tributyl Phosphate (TBP) as plasticizers in PVC matrix.Electrode parameters including slopes, working concentrations ph. The interference effect in the presence of (Na+, Mg+2, Al+3, Glycine, Alanine, Arginine and Phenylalanine) was studied using the separated a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Multiwavelet based-approach to detect shared congestion in computer networks
...Show More Authors

Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Tue Jan 19 2016
Journal Name
Journal Of Engineering
Assessing Close Range Photogrammetric Approach to Evaluate Pavement Surface Condition
...Show More Authors

The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determination (R2). The first techniqu

... Show More
Publication Date
Wed Jul 09 2025
Journal Name
International Journal Of Engineering &amp; Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref