Preferred Language
Articles
/
bhf1U5IBVTCNdQwCm6ve
Investigation of the optimum cutting conditions during turning aluminum alloy using Taguchi method
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
New Turbidimetric-Continuous Flow Injection Analysis Method for The Determination of Chlorpromazine HCl in Pharmaceutical Preparation Using Linear Array Ayah 5SX1-T-1D-CFI Analyser
...Show More Authors

A new turbidimetric-flow injection method is described for the determination of chlorpromazine HCl in pure and pharmaceutical preparation. The method is characterized by simplicity, sensitivity and fast, it is based on formation of ion pair compound between chlorpromazine HCl and Potassium hexacyanoferrate(III) in an acid medium for the formation of greenish yellow precipitate. This precipitate was determined using homemade Linear Array Ayah 5SX1-T-1D continuous flow injection analyser. Optimum concentrations of chemical reactants, physical instrumental conditions have been investigated. The linear dynamic range of chlorpromazine HCl was 3-30 mmol.L-1 while correlation coefficient (r) was 0.9929 and percentage linearity (%r2) C.O.D was 9

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Diyala Journal For Pure Sciences
Multipole Mixing Ratios for Gamma transitions in 56Fe populated in Reaction by using least square fitting method .
...Show More Authors

The γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.

Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Ferqnency of some Legionella species isolated from cooling towers, during two years
...Show More Authors

One   hundred   Ninty   two  s mples  were  collected from   (Cooling towers) between           the                 period       1 /l/2004-13/12/2005.   The                          Results Rev a)ecL that  physical    and   chemic:a)  analysefor watr  samples including   Tempera  re,,  pH and  cWodde  concentration  ranges were f01:md

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Study of Actual Jupiter Observation Days at UFRO Station During 2004 Year
...Show More Authors

In this Paper, There are attempts to compare the actual Observation Days in Decametric range (18-28 MHz), For Jupiter received by UFRO Earths’ station with the Prediction Observation Days that the Jupiter can be observed at Jupiter’s suitable location. The Jupiter’s Radio Observations actual data during year 2004, was taken from (Radio JOVE Data Archive website). The determination of the prediction days carried out by using the (Radio-Jupiter pro Jove Edition) software for Jupiter radio storms at UFRO station coordinates. Some Cases are considered according to Jupiter’s altitudes and Sun location at UFRO station Sky. The conclusion is, it could be found that there are (82) number of Predictions Observation Days, and It’s found

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 07 2021
Journal Name
Journal Of Craniofacial Surgery
Management of Maxillofacial Trauma in Attempt Suicide Patients During COVID-19 Pandemic
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Mass Transfer Coefficient During Cathodic Protection of Low Carbon Steel in Seawater
...Show More Authors

The aim of this research is to calculate mass transfer coefficient, kd, during cathodic protection of low carbon steel in neutral seawater (3.5% W/V NaCl in distilled water with pH = 7). Two types of cathodic protection were used:

First: Sacrificial anode cathodic protection (SACP) were a pipeline of steel carrying seawater  using zinc as a sacrificial anode and with variable temperatures ranged (0 – 45oC) and volumetric flow rate ranged (5 – 900 lit/hr). It was found that the kd increases with increasing temperature and volumetric flow rate of seawater, where kd ranged (0.24×10-6 – 41.6×10-6 m/s).

Second: Impressed current cathodic pr

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 11 2003
Journal Name
Iraqi Journal Of Laser
Modeling of Plasma Affected Thermal Profile in Solids During Laser Materials Processing
...Show More Authors

A new scheme of plasma-mediated thermal coupling has been implemented which yields the temporal distributions of the thermal flux which reaches the metal surface, from which the spatial and temporal temperature profiles can be calculated. The model has shown that the temperature of evaporating surface is determined by the balance between the absorbed power and the rate of energy loss due to evaporation. When the laser power intensity range is 107 to108 W/cm2 the temperature of vapor could increase beyond the critical temperature of plasma ignition, i.e. plasma will be ignited above the metal surface. The plasma density has been analyzed at different values of vapor temperature and pressure using Boltzmann’s code for calculation of elec

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication