Preferred Language
Articles
/
L4Yho4YBIXToZYALApu4
Groundwater protection from lead contamination using granular dead anaerobic sludge biosorbent as permeable reactive barrier
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Valuable Metals From Spent Hydrodesulfurization Catalyst By Two Stage Leaching Method
...Show More Authors

Spent hydrodesulfurization (Co-Mo/γ-Al2O3) catalyst generally contains valuable metals like molybdenum (Mo), cobalt (Co), aluminium (Al) on a supporting material, such as γ-Al2O3. In the present study, a two stages alkali/acid leaching process was conducted to study leaching of cobalt, molybdenum and aluminium from Co-Mo/γ-Al2O3 catalyst. The acid leaching of spent catalyst, previously treated by alkali solution to remove molybdenum, yielded a solution rich in cobalt and aluminium.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study on Candida spp. infection oral thrush and bacteria accompanied it from children
...Show More Authors

Oral swab samples were collected from 120 children (ages between one month- 10 years) who were infected with oral thrush and 30 healthy children. The percentages of isolated yeasts and Bacteria were 66.6% and 96.6% respectively. The dominate yeast and bacteria were Candida albicans and Staphylococcus aureus with of 78.7% and 34.4% respectively. Results revealed that the highest percent of infection with oral thrush disease was 32.5% in children within the age of 1-2 months.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Properties of Trimethylolpropane Triesters from Coconut (Cocos nucifera) Methyl Esters
...Show More Authors

In this study, the acid-alkaline transesterification of refined coconut seed oil (RCOSO) to fatty acid methyl ester was followed by the production of a trimethylolpropane-based thermosensitive biolubricant using potassium hydroxide, and its physicochemical characteristics were evaluated. The American Standard Test for Materials (ASTM) was employed to ascertain the biolubricant's pour point and index of viscosity, which were found to be -4 oC and 283.75, respectively. The opposite connection between lubricant viscosity and temperature was shown by the measured viscosities at varied transesterification to be transformed into biodiesel. Following this, a biolubricant was created by further transesterifiedtemperature. The ester gr

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Finding timewise diffusion coefficient from nonlocal integral condition in one-dimensional heat equation
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2001
Journal Name
Scientific Nursing Journal
Labelling of circulating phagocyting cells using methylene blue
...Show More Authors

To asses methylene blue as a cell marker, the cells of the buffy coat were labelled by incubating them in a medium containing a lable [Methylene blue] which is prepared in a concentration of 1%[1, 2, 3, 4, 5, 6] drops were tried at different periods of incubation [+/-,+/-, 1+/-, 1+/-] at 37 C degree. The results showed that monocytes and polymorphs are the main cells involved in the phagocytosis of this dye

Publication Date
Tue Oct 19 2021
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Object Tracking Using Adaptive Diffusion Flow Active Model
...Show More Authors

Object tracking is one of the most important topics in the fields of image processing and computer vision. Object tracking is the process of finding interesting moving objects and following them from frame to frame. In this research, Active models–based object tracking algorithm is introduced. Active models are curves placed in an image domain and can evolve to segment the object of interest. Adaptive Diffusion Flow Active Model (ADFAM) is one the most famous types of Active Models. It overcomes the drawbacks of all previous versions of the Active Models specially the leakage problem, noise sensitivity, and long narrow hols or concavities. The ADFAM is well known for its very good capabilities in the segmentation process. In this

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Science
Segmentation of Aerial Images Using Different Clustering Techniques
...Show More Authors

The segmentation of aerial images using different clustering techniques offers valuable insights into interpreting and analyzing such images. By partitioning the images into meaningful regions, clustering techniques help identify and differentiate various objects and areas of interest, facilitating various applications, including urban planning, environmental monitoring, and disaster management. This paper aims to segment color aerial images to provide a means of organizing and understanding the visual information contained within the image for various applications and research purposes. It is also important to look into and compare the basic workings of three popular clustering algorithms: K-Medoids, Fuzzy C-Mean (FCM), and Gaussia

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Journal Of Engineering Research And Sciences
Images Compression using Combined Scheme of Transform Coding
...Show More Authors

Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF