Preferred Language
Articles
/
alkej-121
Kinetic Study of the Leaching of Iraqi Akashat Phosphate Ore Using Lactic Acid
...Show More Authors

     In the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by surface chemical reaction. The study showed that the reaction kinetics was specifically described by the shrinking core model (SCM). Regression analyses gave values of activation energy (Ea) and Arrhenius constant (ko) as 40.108 KJ/mole and (2.256 103 sec-1) respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Grace in the Holy Quran: Objective study
...Show More Authors

God is the source of every grace in which man lives and enjoys, and there is no one in the world told himself that created and destined and ridiculed and found out of nothing God Almighty alone.
The grace is an affliction from God Almighty, when God Almighty blesses his servant with money or children and others, the slave thinks the acceptance of God Almighty, but may be a source of affliction and scrutiny.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 27 2024
Journal Name
International Journal Of Design & Nature And Ecodynamics
Amino Acid and Hormonal Profiling of the Adrenal Gland in the Pin-Tailed Sandgrouse (Pterocles alchata)
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Prediction the widths of maxillary and mandibular canines and premolars from the widths of maxillary incisors and first molars (Iraqi study)
...Show More Authors

Background: This study aimed to use the combined mesio-distal crowns widths of maxillary incisors and first molars as predictors to the combined mesio-distal crowns widths of maxillary and mandibular canines and premolars. Materials and methods: The sample included 110 Iraqi Arab subjects with an age ranged between 17-25 years and class I skeletal and dental relations. The crown widths of maxillary teeth and mandibular canines and premolars were measured at the largest mesio-distal dimension on the study casts using digital electronic caliper with 0.01 mm sensitivity. Pearson’s correlation coefficient was used to determine the relation between the combined mesio-distal crowns widths of maxillary incisors and first molars and the combined

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Study the eifficiency of land transportation in the economic development under transference to the economic market, the general company of land transportation – case study –
...Show More Authors

Land Transport regards a main element in the In Fra – structure of the national economy where distance and time shortness, open new opportunities of work, develop the different regions and rise the standard of living….

It is necessary to emphasize that the circumastances surrounding Iraq such as wars, economic sanctions, blockade occupation effected negatively upon economic Indicators of land Transportion including Value of output Value added contraction of Investment allocation and  Investment expend tuer and the period of implementation and fulfillment of the projects of Land Transport to be ready to offer their service in underdeveloped country Like Iraq aiming to satisfy Fast and acomprehensi

... Show More
View Publication Preview PDF
Crossref