Preferred Language
Articles
/
alkej-351
Iraqi Bauxite and Porcalinite Rocks Based Refractory, Preparation and Studying Properties
...Show More Authors

Abstract 

Locally natural occurring Iraqi rocks of Bauxite and Porcelanite (after pre calcinations at 1000oC for 1hr) were used, with the addition of different proportions of MgO and Al2O3, to prepare refractory materials. The effects of these additives on the physical and thermal properties of the prepared refractories were investigated.

Many batches of Bauxite/MgO, Bauxite/Al2O3, Bauxite/MgO/Al2O3, and   Porcelanite/ MgO/Al2O3 were prepared. The mixture is milled and classified into different size fractions; fine (less than 45μm) 40%, middle (45-75μm) 40%, and coarse (75-106μm) 20% .                         

X-ray diffraction technique was used to identify the structure of Bauxite and Porcelanite rocks. The samples were formed by semi dry pressing with the addition of few drops of water as a binder. These samples were sintered at 1100oC for 2hrs. Physical properties (linear shrinkage, density and porosity), and the thermal properties (thermal conductivity, diffusivity and specific heat) were measured for all the prepared samples.         

The results show the increasing of density is susceptible to the thermal properties, and also the addition of Al2O3 and MgO to the natural rocks have a limited effect, and the values of the parameters above  for the natural rocks, were in the levels to be used as a refractory material for lining a metal fusion furnaces and other applications.

Keywords: Bauxite, Refractory brick, Porcelanite Stone, Physical properties, Thermal properties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Dec 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reservoir permeability prediction based artificial intelligence techniques
...Show More Authors

   Predicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Reinforcement Learning-Based Television White Space Database
...Show More Authors

Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 18 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Quadtree partitioning scheme of color image based
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (23)
Scopus Crossref
Publication Date
Mon Feb 16 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Cephalometric Study of Iraqi Adult Subjects with Cl I and Cl III Skeletal Relationships and Their Effects on Masseter Muscle Thickness by Using Ultrasonography
...Show More Authors

Background: Masseter muscle is one of the most obvious muscles of mastication and considered as one indicator of jaw muscle activity. It has a major influence on the transverse growth of the midface and the vertical growth of the mandible. This study undertaken to determine the role of cephalometric analysis for discrimination between Cl I and Cl III skeletal relationships, determine the role of ultrasonography in determination of masseter muscle thickness, compare masseter muscle thickness between Cl I and Cl III skeletal relationships, and determine the effect of gender on masseter muscle thickness. Material and Method: The sample of the current study consisted of 70 Iraqi subjects 40 males and 30 females with age ranging 18-25 years. The

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Investigation of the consistency between reported chief complaint and periodontal health status of Iraqi patients in relation to age and gender (A retrospective study)
...Show More Authors

Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Investigation of the consistency between reported chief complaint and periodontal health status of Iraqi patients in relation to age and gender (A retrospective study)
...Show More Authors

Background: Chief complaint of patients attending dental clinic represents the first step towards treatment plan. However, most of patients are not aware but the extent and severity of periodontal disease, which could be also, misdiagnose by the dentist. Aim of the study: To investigate whether reported chief complaint(s) are consistent with oral hygiene status Materials and methods: Records of 1102 patients, attending periodontics clinics in the college of dentistry/ university of Baghdad, were used to determine ten most commonly reported chief complaints. Sample of patients was further subdivided according to gender and age. In addition, plaque and gingival index were recorded to determine oral hygiene status. Results: Patients mostly

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Job enrichment, knowledge capital and its impact on strategic success: exploratory study at a sample of the Iraqi government and Private Colleges on Baghdad
...Show More Authors

The problem of research was the lack of research that dealt with issue of the job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of job enrichment,  and knowledge capitalon strategic success, starting from the hypothesis that there significant impact of job enrichment and knowledge capital on strategic success, to achieve this goal the researchers from the theoretical literature and  related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted job enrichment as independent variable while knowledge capital plays two roles, the first as an independent variable and the second as an intermediate

... Show More
View Publication
Crossref