Preferred Language
Articles
/
GRYbcocBVTCNdQwCJkte
Manufacturing Perforated and Ordinary Bricks Using Injana Claystone Exposed in The Middle of Iraq
...Show More Authors

This study aims to use claystone beds exposed in the Injana Formation (Late Miocene) at Karbala-Najaf plateau, middle of Iraq for the manufacturing of perforated and ordinary bricks. The claystone samples were assessed as an alternative material of the recent sediments, which are preferred to remain as agricultural land. The claystones are sandy mud composing of 29.1 - 39.1% clay, 37.2 - 54.8% silt and 14.1-26.8% sand. They consist of kaolinite, illite, chlorite, palygorskite, and montmorillonite with a lot of quartz, calcite, dolomite, gypsum and feldspar. Claystone samples were characterized by linear shrinkage 0.01 - 0.1%, volume shrinkage 0.1 - 0.9%, bulk density 1.2 - 2.11gm/cm3 (1.68 g / cm3 average), and the efflorescence is varied from low to nil. The claystones are accordingly considered as a suitable material for the manufacture of perforated and ordinary bricks in grades A and B based on Iraqi Standard specifications No. 25 (ISS, 1993).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 15 2023
Journal Name
International Journal Of Advances In Intelligent Informatics
An automatic lip reading for short sentences using deep learning nets
...Show More Authors

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Ecological Engineering
Heavy Metals Removal from Simulated Wastewater using Horizontal Subsurface Constructed Wetland
...Show More Authors

This study aimed to assess the efficiency of Nerium oleander in removing three different metals (Cd, Cu, and Ni) from simulated wastewater using horizontal subsurface flow constructed wetland (HSSF-CW) system. The HSSF-CW pilot scale was operated at two hydraulic retention times (HRTs) of 4 and 7 days, filled with a substrate layer of sand and gravel. The results indicated that the HSSF-CW had high removal efficiency of Cd and Cu. A higher HRT (7 days) resulted in greater removal efficiency reaching up to (99.3% Cd, 99.5% Cu, 86.3% Ni) compared to 4 days. The substrate played a significant role in removal of metals due to adsorption and precipitation. The N. oleander plant also showed a good tolerance to the uptake of Cd, Cu, and Ni ions fr

... Show More
Scopus (9)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Heliyon
Heterogeneously catalyzed transesterification reaction using waste snail shell for biodiesel production
...Show More Authors

Biodiesel as an attractive energy source; a low-cost and green synthesis technique was utilized for biodiesel preparation via waste cooking oil methanolysis using waste snail shell derived catalyst. The present work aimed to investigate the production of biodiesel fuel from waste materials. The catalyst was greenly synthesized from waste snail shells throughout a calcination process at different calcination time of 2–4 h and temperature of 750–950 ◦C. The catalyst samples were characterized using X-Ray Diffraction (XRD), Brunauer-Emmett-Teller (BET), Energy Dispersive X-ray (EDX), and Fourier Transform Infrared (FT-IR). The reaction variables varying in the range of 10:1–30:1 M ratio of MeOH: oil, 3–11 wt% catalyst loading, 50–

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Direct method for Solving Nonlinear Variational Problems by Using Hermite Wavelets
...Show More Authors

In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Analytic Solutions For Integro-Differential Inequalities Using Modified Adomian Decomposition Method
...Show More Authors

   This paper applies the Modified Adomian Decomposition Method (MADM) for solving Integro-Differential Inequality, this method  is one of effective to construct analytic approximate solutions for linear and nonlinear integro-differential inequalities without solving many integrals and transformed or discretization. Several examples are presented, the analytic results show that this method is a promising and powerful for solving these problems.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2018
Journal Name
Iraqi Journal Of Science
A Secure Enhancement for Encoding/ Decoding data using Elliptic Curve Cryptography
...Show More Authors

The Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Educational Data Mining For Predicting Academic Student Performance Using Active Classification
...Show More Authors

     The increasing amount of educational data has rapidly in the latest few years. The Educational Data Mining (EDM) techniques are utilized to detect the valuable pattern so that improves the educational process and to obtain high performance of all educational elements. The proposed work contains three stages: preprocessing, features selection, and an active classification stage. The dataset was collected using EDM that had a lack in the label data, it contained 2050 records collected by using questionnaires and by using the students’ academic records. There are twenty-five features that were combined from the following five factors: (curriculum, teacher, student, the environment of education, and the family). Active learning ha

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref