Preferred Language
Articles
/
_4bxqIYBIXToZYALjaKh
Combination of the artificial neural network and advection-dispersion equation for modeling of methylene blue dye removal from aqueous solution using olive stones as reactive bed
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Herbal Medicine
Four-day randomized controlled crossover trial evaluating the antiplaque effect of a combination of green tea and Salvadora persica L. mouthwash
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Herbal Medicine
Four-day randomized controlled crossover trial evaluating the antiplaque effect of a combination of green tea and Salvadora persica L. mouthwash
...Show More Authors

Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Oxygen Mass Transfer in an Internal Loop Airlift Reactor with Axial Dispersion Model
...Show More Authors

The effect of superficial gas velocity within the range 0.01-0.164 m/s on gas holdup (overall, riser and down comer), volumetric oxygen mass transfer coefficient, liquid circulation velocity was studied in an internal loop concentric tubes airlift reactor (working volume 45 liters). It was shown that as the usg increases the gas holdup and also the liquid circulation velocity increase. Also it was found that increasing superficial gas velocity lead to increase the interfacial area that increases the overall oxygen mass transfer coefficient. The hydrodynamic experimental results were modeled with the available equations in the literature. The predicted data gave an acceptable accuracy with the empirical data.

The final

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Splitting the One-Dimensional Wave Equation. Part I: Solving by Finite-Difference Method and Separation Variables
...Show More Authors

In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Irradiation Duration Effect of Gamma Ray on the Compressive Strength of Reactive Powder Concrete
...Show More Authors

Reactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the

... Show More
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Key Engineering Materials
Irradiation Duration Effect of Gamma Ray on the Compressive Strength of Reactive Powder Concrete
...Show More Authors

Reactive Powder Concrete (RPC) could be considered as the furthermost significant modern high compressive strength concrete. In this study, an experimental investigation on the impact of micro steel fiber volume fraction ratio and gamma ray irradiation duration influence upon the compressive strength of RPC is presented. Three volume fraction ratios (0.0, 1.0 and 1.5) % was implemented. For each percentage of the adopted fiber ratios, six different irradiation duration was considered; these are (1, 2, 3, 4, 5 and 6) days. Gamma source (Cs-137) of energy (0.662) MeV and activity (6) mci was used. In a case of zero volume fraction ratio, the experimental results showed that gamma ray had a significant influence on the reducing of the

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
MODELING THE TRANSPORT OF CONTAMINANT BY WASHING PROCESS IN THE SANDY SOIL
...Show More Authors

The aim of this study is modeling the transport of industrial wastewater in sandy soil by using finite element method. A washing technique was used to remove the industrial wastewater from the soil. The washing technique applied with an efficient hydraulic gradient to help in transport of contaminant mass by advection. Also, the mass transport equation used in modeling the transport of industrial wastewater from soil includes the sorption and chemical reactions. The sandy soil samples obtained from Al-Najaf Governorate/Iraq. The wastewater contaminant was obtained from Al- Musyiebelectricity power plant. The soil samples were synthetically contaminated with four percentages of 10, 20, 30 and 40% of the contaminant and these percentages calc

... Show More
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Modeling Human Capital Impact on the Development of the Iraqi Oil Industry
...Show More Authors

Iraq has the second largest proven oil reserves in the world. According to oil experts, it is expected that the Iraq's reserves to rise to 200+ billion barrels of high-grade crude.

Oil is a strategic commodity for producing and exporting countries in general, and Iraq in particular, as demonstrated by the international experience that oil is an important means to achieve economic growth, an important tool in the overall economic, social and political development. It is also an important source of hard currency for any national economy and a means to connect the local economy and the global economy. In this paper we focus our attention on selecting the best regression model that explain the effect of human capita

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF