Preferred Language
Articles
/
alkej-306
Gasoline, Ethanol and Methanol (GEM) Ternary Blends utilization as an Alternative to Conventional Iraqi Gasoline to Suppress Emitted Sulfur and Lead Components to Environment
...Show More Authors

 

Iraqi conventional gasoline characterized by its low octane number not exceed 82 and high lead and sulfur content. In this paper tri-component or ternary, blends of gasoline, ethanol, and methanol presented as an alternative fuel for Iraqi conventional gasoline. The study conducted by using GEM blend that equals E85 blend in octane rating. The used GEM selected from Turner, 2010 collection. G37 E20 M43 (37% gasoline + 20% ethanol+ 43% methanol) was chosen as GEM in present study. This blend used in multi-cylinder Mercedes engine, and the engine performance, and emitted emissions compared with that produced by a gasoline engine.

The results show that this blend can formulate with available Iraqi produced materials. GEM ternary blend offers significant advantages in terms of engine performance compared to gasoline. Also, GEM higher useful compression ratio (HUCR) = 9.25 while gasoline HUCR=7.5. The increment in engine bp was 24.12%, BSFC reduced by 13.9% and brake thermal efficiency increased by 19.59%. The volumetric efficiency increased by 8.06%. Also, CO, HC concentrations were reduced by 30.5%, 25.16% respectively. Smoke opacity reduced by 46.49% and CO2 concentrations reduced by 5% as well as NOx concentrations that reduced by 1.75%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement of Generative Adversarial Networks to Generate Digital Color Images of Skin Diseases
...Show More Authors

     The main task of creating new digital images of different skin diseases is to increase the resolution of the specific textures and colors of each skin disease. In this paper, the performance of generative adversarial networks has been optimized to generate multicolor and histological color digital images of a variety of skin diseases (melanoma, birthmarks, and basal cell carcinomas). Two architectures for generative adversarial networks were built using two models: the first is a model for generating new images of dermatology through training processes, and the second is a discrimination model whose main task is to identify the generated digital images as either real or fake. The gray wolf swarm algorithm and the whale swarm alg

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Nov 01 2021
Journal Name
2021 International Conference On Intelligent Technology, System And Service For Internet Of Everything (itss-ioe)
Application of MQ-Sensors to Indoor Air Quality Monitoring in Lab based on IoT
...Show More Authors

Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Applied Biology & Biotechnology
Field treatment of three wheat varieties with Trichoderma harzianum bioagent to control Anguina tritici
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Ecological Engineering
Using Machine Learning Algorithms to Predict the Sweetness of Bananas at Different Drying Times
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archive
Isolation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency
...Show More Authors

solation of candida spp. From cancer patients who suffered oral candidiasis due to immunodeficiency

Scopus (2)
Scopus
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Deep Convolutional Neural Network Architecture to Detect COVID-19 from Chest X-Ray Images
...Show More Authors

      Today, the world is living in a time of epidemic diseases that spread unnaturally and infect and kill millions of people worldwide. The COVID-19 virus, which is one of the most well-known epidemic diseases currently spreading, has killed more than six million people as of May 2022. The World Health Organization (WHO) declared the 2019 coronavirus disease (COVID-19) after an outbreak of SARS-CoV-2 infection. COVID-19 is a severe and potentially fatal respiratory disease caused by the SARS-CoV-2 virus, which was first noticed at the end of 2019 in Wuhan city. Artificial intelligence plays a meaningful role in analyzing medical images and giving accurate results that serve healthcare workers, especially X-ray images, which are co

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (25)
Crossref (10)
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Prediction of DNA Binding Sites Bound to Specific Transcription Factors by the SVM Algorithm
...Show More Authors

In gene regulation, transcription factors (TFs) play a key function. It transmits genetic information from DNA to messenger RNA during the process of DNA transcription. During this step, the transcription factor binds to a segment of the DNA sequence known as Transcription Factor Binding Sites (TFBS). The goal of this study is to build a model that predicts whether or not a DNA binding site attaches to a certain transcription factor (TF). TFs are regulatory molecules that bind to particular sequence motifs in the gene to induce or restrict targeted gene transcription. Two classification methods will be used, which are support vector machine (SVM) and kernel logistic regression (KLR). Moreover, the KLR algorithm depends on another regress

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat May 11 2013
Journal Name
Journal Of Arts Of Thiqar
Mistranslation of Sex-related Euphemistic Expressions with reference to the Translations of the Qur'an
...Show More Authors