Preferred Language
Articles
/
SBY8nYoBVTCNdQwCJKHH
The infrared <i>K</i>-band identification of the DSO/G2 source from VLT and Keck data
...Show More Authors
Abstract<p>A fast moving infrared excess source (G2) which is widely interpreted as a core-less gas and dust cloud approaches Sagittarius A* (Sgr A*) on a presumably elliptical orbit. VLT <italic>K<sub>s</sub></italic>-band and Keck <italic>K</italic>′-band data result in clear continuum identifications and proper motions of this ∼19<sup><italic>m</italic></sup> Dusty S-cluster Object (DSO). In 2002-2007 it is confused with the star S63, but free of confusion again since 2007. Its near-infrared (NIR) colors and a comparison to other sources in the field speak in favor of the DSO being an IR excess star with photospheric continuum emission at 2 microns than a core-less gas and dust cloud. We also find very compact <italic>L</italic>′-band emission (<0.1″) contrasted by the reported extended (0.03″ up to ∼0.2″ for the tail) Brγ emission. The presence of a star will change the expected accretion phenomena, since a stellar Roche lobe may retain a fraction of the material during and after the peri-bothron passage.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study the Feasibility of Alumina for the Adsorption of Metal Ions from Water
...Show More Authors

The present work describes the adsorption of Ba2+ and Mg2+ions from aqueous solutions by activated alumina in single and binary system using batch adsorption. The effect of different parameters such as amount of alumina, concentration of metal ions, pH of solution, contact time and agitation speed on the adsorption process was studied. The optimum adsorbent dosage was found to be 0.5 g and 1.5 g for removal of Ba2+ and Mg2+, respectively. The optimum pH, contact time and agitation speed, were found to be pH 6, 2h and 300 rpm, respectively, for removal of both metal ions. The equilibrium data were analyzed by Langmuir and Freundlich isotherm models and the data fitted well to both isotherm modes as indicated by higher correlation of deter

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Palm dates as a source for isolation of Aspergillus niger to produce citric acid by submerged fermentation; kinetics study
...Show More Authors
Abstract<p>The study discussed here deals with the isolation of Aspergillus niger from palm dates, the formal and the most famous fruit in Iraq, to test and qualify this fungus isolate for its ability to produce citric acid. Submerged fermentation technique was used in the fermentation process. A.niger isolated from “Zahdi” Palme dates was used in the study of the fermentation kinetics to get the production efficiency of citric acid. Kinetics of CA production via fermentation by A. niger S11 was evaluated within 432 h fermentation time and under submerged conditions of 11% (w/v) sucrose, 5% (v/v) inoculum size, pH 4, 30 °C and 150 rpm. The maximum citric acid produced was (37.116 g/l). Kine</p> ... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 28 2017
Journal Name
Medycyna Pracy
MTS-6 detectors calibration by using &lt;sup&gt;239&lt;/sup&gt;Pu-Be neutron source
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Mar 17 2016
Journal Name
International Journal Of Computer Applications
Analysis of Wind Speed Data and Annual Energy Potential at Three locations in Iraq
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 16 2017
Journal Name
Signal, Image And Video Processing
Enhancing Prony’s method by nuclear norm penalization and extension to missing data
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus Crossref