Preferred Language
Articles
/
8RYsRokBVTCNdQwCfYcV
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 14 2023
Journal Name
Iraqi Journal Of Science
Optimum conditions for Invertase production from Saccharomyces cere-visiae using solid state fermentation
...Show More Authors

Three Saccharomyces cerevisiae isolates from different sources (China, Turkey and Egypt) were screened by culturing on solid state fermentation to select the most efficient isolate for invertase production. S. cerevisiae from China was high specific activity 34.7 U/mg. The optimum conditions for enzyme production from this isolate were determined by using a medium composed of wheat bran moisten with 1:0.5 (v:w) corn steep liquor as nitrogen source at initial pH 5.0 for 5 days at 30OC.

View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Modeling and Simulation of Sensorless Speed Control of a Buck Converter Controlled Dc Motor
...Show More Authors

This paper investigate a sensorless speed control of a separately excited dc motor fed from a buck type dc-dc converter. The control system is designed in digital technique by using a two dimension look-up table. The performance of the drive system was evaluated by digital simulation using Simulink toolbox of Matlab.

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Recognizing Job Apathy Patterns of Iraqi Higher Education Employees Using Data Mining Techniques
...Show More Authors

Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Sub-Surface Investigation of Khashim Al-Ahmer Gas Field Using Seismic Reflection Data
...Show More Authors

This paper is carried out to detect the subsurface structures that have geological
and economical importance by interpreting the available reflection seismic data of
an area estimated to be about (740) km2. The Khashim Al-Ahmer structure is partial
of series structures of (Injana – Khashim Al-Ahmer – Mannsorya) from the (NW to
the SE), it is located within for deep faulted area. The component of the one
elongated dome of asymmetrical of structure which has(SW) limb more steeper than
the (NE) limb.Twenty three seismic sections had been interpreted for two seismic
surveys and the total length of all seismic lines is about (414.7) Km. Interpretation
of seismic data was focused on two reflectors (Fatha and Jeribi)

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 08 2019
Journal Name
Desalination And Water Treatment
Xylenol orange removal from aqueous solution by natural bauxite (BXT) and BXT-HDTMA: kinetic, thermodynamic and isotherm modeling
...Show More Authors

Sorption is a key factor in removal of organic and inorganic contaminants from their aqueous solutions. In this study, we investigated the removal of Xylenol Orange tetrasodium salt (XOTS) from its aqueous solution by Bauxite (BXT) and cationic surfactant hexadecyltrimethyl ammonium bromide modified Bauxite (BXT-HDTMA) in batch experiments. The BXT and BXT-HDTMA were characterized using FTIR, and SEM techniques. Adsorption studies were performed at various parameters i.e. temperature, contact time, adsorbent weight, and pH. The modified BXT showed better maximum removal efficiency (98.6% at pH = 9.03) compared to natural Bauxite (75% at pH 2.27), suggesting that BXT-HDTMA is an excellent adsorbent for the removal of XOTS from water. The equ

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Desalination And Water Treatment
Xylenol orange removal from aqueous solution by natural bauxite (BXT) and BXT-HDTMA: kinetic, thermodynamic and isotherm modeling
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref