Preferred Language
Articles
/
bsj-539
A New method for ISE construction for methyl orange dyes and using for indirect determination of Amitriptyline Hydrochloried drug
...Show More Authors

A new method for construction ion-selective electrode (ISE) by heating reaction of methyl orange with ammonium reineckate using PVC as plasticizer for determination methyl orange and determination Amitriptyline Hydrochloried drug by formation ion-pair on electrode surface . The characteristics of the electrode and it response as following : internal solution 10-4M , pH (2.5-5) ,temperature (20-30) and response time 2 sec. Calibration response for methyl orange over the concentrationrange 10-3 -10-9 M with R=0.9989 , RSD%=0.1052, D.O.L=0.315X10-9 MEre%=(-0.877- -2.76) , Rec%.=(97.230 -101.711) .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
A Comprehensive Study of Smart Grids
...Show More Authors

In this paper, various aspects of smart grids are described. These aspects include the components of smart grids, the detailed functions of the smart energy meters within the smart grids and their effects on increasing the awareness, the advantages and disadvantages of smart grids, and the requirements of utilizing smart grids. To put some light on the difference between smart grids and traditional utility grids, some aspects of the traditional utility grids are covered in this paper as well.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 29 2018
Journal Name
Journal Of Engineering
Exergy Analysis of a Domestic Refrigerator
...Show More Authors

An energy and exergy thermodynamic analysis using EES program was done for a domestic refrigerator working with R-134a using vapor compression refrigeration cycle. The analysis deals with the system component, i.e. compressor, condenser, evaporator and the expansion device. The analysis depends on the entropy generation minimization approach to improve the refrigerator performance by exploring the optimum design points. These design points were derived from three different theories governing the entropy generation minimization using exergy analyzing method. These theories were first applied to find the optimum balance between the hot inner condenser area and the cold inner evaporator area of the refrigerator and between

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 03 2015
Journal Name
Journal Of New Theory
TOPOLOGY SPECTRUM OF A KU-ALGEBRA
...Show More Authors

The aim of this paper is to study the Zariski topology of a commutative KU-algebra. Firstly, we introduce new concepts of a KU-algebra, such as KU-lattice, involutory ideal and prime ideal and investigate some basic properties of these concepts. Secondly, the notion of the topology spectrum of a commutative KU-algebra is studied and several properties of this topology are provided. Also, we study the continuous map of this topological space.

Publication Date
Sun Aug 01 2021
Journal Name
Materials Today: Proceedings
A review of automatic history matching
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Order Sum Graph of a Group
...Show More Authors

The concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.

View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust estimation of multiple linear regression parameters in the presence of a problem of heterogeneity of variance and outliers values
...Show More Authors

Often times, especially in practical applications, it is difficult to obtain data that is not tainted by a problem that may be related to the inconsistency of the variance of error or any other problem that impedes the use of the usual methods represented by the method of the ordinary least squares (OLS), To find the capabilities of the features of the multiple linear models, This is why many statisticians resort to the use of estimates by immune methods Especially with the presence of outliers, as well as the problem of error Variance instability, Two methods of horsepower were adopted, they are the robust weighted least square(RWLS)& the two-step robust weighted least square method(TSRWLS), and their performance was verifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dye Removal from Wastewater Using Iron Salts
...Show More Authors

This investigation was carried out to study the treatment and recycling of wastewater in the cotton textile industry for an effluent containing three dyes: direct blue, sulphur black and vat yellow. The reuse of such effluent can only be made possible by appropriate treatment method such as chemical coagulation. Ferrous and ferric sulphate with and without calcium hydroxide were employed in this study as the chemical coagulants.
The results showed that the percentage removal of direct blue ranged between 91.4 and 94 , for sulphur black ranged between 98.7 and 99.5 while for vat yellow it was between 97 and 99.

View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF