Preferred Language
Articles
/
bsj-2483
An Efficient Numerical Method for Solving Volterra-Fredholm Integro-Differential Equations of Fractional Order by Using Shifted Jacobi-Spectral Collocation Method
...Show More Authors

The aim of this article is to solve the Volterra-Fredholm integro-differential equations of fractional order numerically by using the shifted Jacobi polynomial collocation method. The Jacobi polynomial and collocation method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are considered in the Caputo sense. Numerical examples are given to show the accuracy and reliability of the proposed technique.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Esterification of Free Fatty Acid with High Chain Alcohol for Biodiesel Production Using Semi-Batch Reactive Distillation
...Show More Authors

The esterification of oleic acid with 2-ethylhexanol in presence of sulfuric acid  as homogeneous catalyst was investigated in this work to produce 2-ethylhexyl oleate (biodiesel) by using semi batch reactive distillation. The effect of reaction temperature (100 to 130°C), 2-ethylhexanol:oleic acid molar ratio (1:1 to 1:3) and catalysts concentration (0.2 to 1wt%) were studied. Higher conversion of 97% was achieved with operating conditions of reaction temperature of 130°C, molar ratio of free fatty acid to alcohol of 1:2 and catalyst concentration of 1wt%. A simulation was adopted from basic principles of the reactive distillation using MATLAB to describe the process. Good agreement was achieved.

View Publication Preview PDF
Publication Date
Mon Nov 28 2016
Journal Name
Separation Science And Technology
Using sewage sludge as a permeable reactive barrier for remediation of groundwater contaminated with lead and phenol
...Show More Authors

Scopus (24)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Petroleum And Coal
Evaluation of geomechanical properties for tight reservoir using uniaxial compressive test, ultrasonic test, and well logs data
...Show More Authors

Scopus (9)
Scopus
Publication Date
Thu Sep 01 2022
Journal Name
Journal Of Engineering
Design and Implementation of Active Noise Cancellation for Car Cabin on Sulaimania Roads Using Arduino Embedded System
...Show More Authors

Car drivers hear many kinds of noise inside their vehicles' cabins, and the most annoying ones are the noise generated by tires, engines, and outside winds. Noise affects the comfort of the passengers inside the cabin, and it’s sad to say that modern cars are noisier in many kinds of noise signals due to using a lot of plastic materials in new budget cars. For expensive and luxury cars, the problem is solved by using better sound insulation materials, but for the budget ones, the approach used here is effective. It is called Active Noise Cancellation and can be done using analog or digital electronics. An operational amplifier and filters are used for the analog one, and in the digital one, signal processor chips are used. In engineeri

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jul 19 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Game Theory to Determine the Optimal Strategy for the Transportation Sector in Iraq
...Show More Authors

In this paper, game theory was used and applied to the transport sector in Iraq, as this sector includes two axes, the public transport axis and the second axis the private transport axis, as each of these axes includes several types of transport, namely (sea transport, air transport, land transport, transport by rail, port transport) and the travel and tourism sector, as public transport lacks this sector, as the competitive advantage matrix for the transport sector was formed and after applying the MinMax-MaxMin principle to the matrix in all its stages, it was found that there was an equilibrium point except for the last stage where the equilibrium point was not available Therefore, the use of the linear programming method was

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Radon concentrations assessment in tap water for different areas in Baghdad city using Rad7
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing Reinforced Concrete Girders Using Externally Post-Tensioned Tendons
...Show More Authors

This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
Deep Learning Approach for Oil Pipeline Leakage Detection Using Image-Based Edge Detection Techniques
...Show More Authors

Natural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are

... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Crossref