In the present work, leaching process studiedusing organic acids (acetic acid and lactic acid) to extract phosphate from the Iraqi Akashat phosphate ore by separation of calcareous materials (mainly calcite). This approach characterized by energy conservation, environmental enhancement by recovery of calcite as calcium sulfate (gypsum), keeping the physical and chemical properties of apatite. Samples were analyzed using X-ray diffraction and FTIR spectrophotometer. From the obtained experimental data it was found that using the two organic acids yields closed purity values of the produced apatite at the optimum conditions, while at different acid concentrations, it was found that the efficiency of acetic acid is higher at the low acid concentration (2 wt%), and that lactic acid gives the higher efficiency at high acid concentration (10 wt%).Concerning the ratio of acid volume to ore weight ratio, it was found that reducing this ratio to 5 ml/gm cause an increase in the purity of apatite at the optimum concentrations of the two acids. In addition, it was found that the reaction ofthe two organic acids with the calcareous material are fast and that the optimum reaction time, in which high purity apatite produced is 10 minutes.
English
Breast cancer is a heterogeneous disease characterized by molecular complexity. This research utilized three genetic expression profiles—gene expression, deoxyribonucleic acid (DNA) methylation, and micro ribonucleic acid (miRNA) expression—to deepen the understanding of breast cancer biology and contribute to the development of a reliable survival rate prediction model. During the preprocessing phase, principal component analysis (PCA) was applied to reduce the dimensionality of each dataset before computing consensus features across the three omics datasets. By integrating these datasets with the consensus features, the model's ability to uncover deep connections within the data was significantly improved. The proposed multimodal deep
... Show MoreIn this paper, a fusion of K models of full-rank weighted nonnegative tensor factor two-dimensional deconvolution (K-wNTF2D) is proposed to separate the acoustic sources that have been mixed in an underdetermined reverberant environment. The model is adapted in an unsupervised manner under the hybrid framework of the generalized expectation maximization and multiplicative update algorithms. The derivation of the algorithm and the development of proposed full-rank K-wNTF2D will be shown. The algorithm also encodes a set of variable sparsity parameters derived from Gibbs distribution into the K-wNTF2D model. This optimizes each sub-model in K-wNTF2D with the required sparsity to model the time-varying variances of the sources in the s
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show More