In the present work, leaching process studiedusing organic acids (acetic acid and lactic acid) to extract phosphate from the Iraqi Akashat phosphate ore by separation of calcareous materials (mainly calcite). This approach characterized by energy conservation, environmental enhancement by recovery of calcite as calcium sulfate (gypsum), keeping the physical and chemical properties of apatite. Samples were analyzed using X-ray diffraction and FTIR spectrophotometer. From the obtained experimental data it was found that using the two organic acids yields closed purity values of the produced apatite at the optimum conditions, while at different acid concentrations, it was found that the efficiency of acetic acid is higher at the low acid concentration (2 wt%), and that lactic acid gives the higher efficiency at high acid concentration (10 wt%).Concerning the ratio of acid volume to ore weight ratio, it was found that reducing this ratio to 5 ml/gm cause an increase in the purity of apatite at the optimum concentrations of the two acids. In addition, it was found that the reaction ofthe two organic acids with the calcareous material are fast and that the optimum reaction time, in which high purity apatite produced is 10 minutes.
Typographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreLK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O
... Show More