Preferred Language
Articles
/
KheyX5EBVTCNdQwCMpWg
Factors affecting global virtual teams’ performance in software projects
...Show More Authors

Scopus
Publication Date
Mon Mar 29 2021
Journal Name
Journal Of Engineering
Effluent quality assessment of sewage treatment plant using principal component analysis and cluster analysis
...Show More Authors

Sewage water is a mixture of water and solids added to water for various uses, so it needs to be treated to meet local or global standards for environmentally friendly waste production. The present study aimed to analyze the new Maaymyrh sewage treatment plant's quality parameters statistically at Hilla city. The plant is designed to serve 500,000 populations, and it is operating on a biological treatment method (Activated Sludge Process) with an average wastewater inflow of 107,000m3/day. Wastewater data were collected daily by the Mayoralty of Hilla from November 2019 to June 2020 from the influent and effluent in the (STP) new in Maaymyrh for five water quality standards, such as (BOD5), (COD), (TSS), (TP)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Design and Implementation of Enhanced Smart Energy Metering System
...Show More Authors

In this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Effect of concentrations ratios of NiO on the efficiency of solar cell for (CdO)1-x(NiO)x thin films
...Show More Authors

CdO:NiO/Si solar cell film was fabricated via deposition of CdO:NiO in different concentrations 1%, 3%, and 5% for NiO thin films in R.T and 723K, on n-type silicon substrate with approximately 200 nm thickness using pulse laser deposition. CdO:NiO/n-Si solar cell photovoltaic properties were examined under 60 mW/cm2 intensity illumination. The highest efficiency of the solar cell is 2.4% when the NiO concentration is 0.05 at 723K.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Estimating the Reliability Function of (2+1) Cascade Model
...Show More Authors

This paper discusses reliability R of the (2+1) Cascade model of inverse Weibull distribution. Reliability is to be found when strength-stress distributed is inverse Weibull random variables with unknown scale parameter and known shape parameter. Six estimation methods (Maximum likelihood, Moment, Least Square, Weighted Least Square, Regression and Percentile) are used to estimate reliability. There is a comparison between six different estimation methods by the simulation study by MATLAB 2016, using two statistical criteria Mean square error and Mean Absolute Percentage Error, where it is found that best estimator between the six estimators is Maximum likelihood estimation method.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Study of the Structure of Exotic 52,54,56,58Ca Isotopes Using OXBASH Code
...Show More Authors

This study dedicates to provide an information of shell model calculations, limited to fp-shell with an accuracy and applicability. The estimations depend on the evaluation of Hamiltoian’s eigenvalues, that’s compatible with positive parity of energy levels up to (10MeV) for most isotopes of Ca, and the Hamiltonian eigenvectors transition strength probability and inelastic electron-nucleus scattering.      The Hamiltonian is effective in the regions where we have experimented. The known experimental data of the same were confirmed and proposed a new nuclear level for others.

The calculations are done with the help of OXBASH code. The results show good agreement with experimental energy states

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Anti-inflammatory effects of manuka honey on salivary cytokines (clinical study)
...Show More Authors

Background: Manuka honey (MH) is a mono-floral honey derived from the Manuka tree (Leptospermum scoparium). MH is a highly recognized for its non-peroxide antibacterial activities, which are mostly related to its unique methylglyoxal content (MGO) in MH. The beneficial phytochemicals in MH is directly related to their favorable health effects, which include wound healing, anticancer, antioxidant, and anti-inflammatory properties. Aims: The purpose of this study was to evaluate the effect of MH on pro-inflammatory cytokines (IL-8 and TNF-α) in patients with gingivitis and compare it with chlorhexidine (CHX) and distilled water (DW). Materials and Methods: This study was a randomized, double blinded, and parallel clinical trial. Forty-fiv

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Games via soft-I-Semi-g-Separation axioms
...Show More Authors

In this article, the notions  are introduced by using soft ideal and soft semi-open sets, which are - - - -closed sets " -closed" where many of the properties of these sets are clarified. Some games by using soft- -semi, soft separation axioms: like ( 0   ( 0  Using many figures and proposition to study the relationships among these kinds of games with some examples are explained.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Properties of the Adjoint Operator of a General Fuzzy Bounded Operator
...Show More Authors

Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.

View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 15 2023
Journal Name
Iraqi Journal Of Science
Best Way to Detect Breast Cancer by UsingMachine Learning Algorithms
...Show More Authors

Breast cancer is the second deadliest disease infected women worldwide. For this
reason the early detection is one of the most essential stop to overcomeit dependingon
automatic devices like artificial intelligent. Medical applications of machine learning
algorithmsare mostly based on their ability to handle classification problems,
including classifications of illnesses or to estimate prognosis. Before machine
learningis applied for diagnosis, it must be trained first. The research methodology
which isdetermines differentofmachine learning algorithms,such as Random tree,
ID3, CART, SMO, C4.5 and Naive Bayesto finds the best training algorithm result.
The contribution of this research is test the data set with mis

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF