Preferred Language
Articles
/
bsj-5404
Preparing Nanosilica Particles from Rice Husk Using Precipitation Method
...Show More Authors

Nanosilica was extracted from rice husk, which was locally collected from the Iraqi mill at Al-Mishikhab district in Najaf Governorate, Iraq. The precipitation method was used to prepared Nanosilica powder from rice husk ash, after treating it thermally at 700°C, followed by dissolving the silica in the alkaline solution and getting a sodium silicate solution. Two samples of the final solution were collected to study the effect of filtration on the purity of the sample by X-ray fluorescence spectrometry (XRF). The result shows that the filtered samples have purity above  while the non-filtered sample purity was around  The structure analysis investigated by the X-ray diffraction (XRD), found that the Nanosilica powder has an amorphous structure in nature. Also, it shows a broad peak at (    The particle size distribution was determined by Atomic force microscope (AFM), the results gave that the average diameter equals  and dimension range in , while B.E.T. analysis confirms a high surface area around 618 . FT-IR Spectra experimental data showed the presence of hydrogen-bonded silanol group (Si–O–H) and siloxane group (Si–O–Si) which proved the high purity of Nanosilica particles.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

View Publication
Crossref (45)
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Computational Science
Novel approximate solution for fractional differential equations by the optimal variational iteration method
...Show More Authors

Crossref (45)
Clarivate Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Determination of some characteristics of comet’s gases by photometry method for comet Hyakutake
...Show More Authors

The present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic planning of human resources and its impact on the stages of a career path :A field research in the Ministry of Health
...Show More Authors

Abstract

The objective of this research is to analyze the relationship between the strategic planning for human resources and career path, and I have tested Search the Ministry of  Health and some health centers headquarters in the Karkh district, that is applied in sample Consist of (45) Deputy Director, Head of Depts, Departmental Manager, and health center Manager.

Find interested in studying the two subjects are important and vital, at the level of organizations at the present time, namely the strategic planning of human resources and career path. To achieve the objectives of the research was designed Qusestionnair (31) items to collect  Primary data. and collected t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF ADDITION RAW BACTERIOCIN PRODUCED BY Lactobacillus delbrueckii Sub-Sp. bulgaricus ON SOFT CHEESE: EFFECT OF ADDITION RAW BACTERIOCIN PRODUCED BY Lactobacillus delbrueckii Sub-Sp. bulgaricus ON SOFT CHEESE
...Show More Authors

ABSTRACT

         The effect of adding raw bacteriocin produced by Lactobacillus bulgaricus to cheese curd at an amount of (5 and 10 and 15) mL/kg cheese as a biological preservative to prolong the shelf life of soft cheese, in addition to the control treatment, knowing that each 1 mL of bacteriocin filter contains 15 units/ mL of bacteriocin. The results of the physicochemical, microbial and sensory tests for cheese stored at refrigerator temperature for a period (zero) to (21) d of adding bacteriocin showed the superiority of the treatment of cheese added to 15 mL/kg cheese of bacteriocin over the rest of the other treatments during the storage period, wh

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 20 2028
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETERMINATION OF OPTIMAL CONDITIONS FOR CAROTENOIDS PRODUCTION BY CHEMICAL MUTANAT LOCAL ISOLATE RHODOTORUL MUCILAGENOSA M.: DETERMINATION OF OPTIMAL CONDITIONS FOR CAROTENOIDS PRODUCTION BY CHEMICAL MUTANAT LOCAL ISOLATE RHODOTORUL MUCILAGENOSA M.
...Show More Authors

The aim of this study was to increasing natural carotenoides production by a locally isolate Rodotorula mucilagenosa M. by determination of the optimal conditions for growth and production of this agents, for encouragest to use it in food application permute artificial pigments which harmfull for consumer health and envieronmental. The optimal condition of carotenoides production from Rhodotorula mucilaginosa M were studied. The results shows the best carbon and nitrogen source were glucose and yeast extract. The carotenoids a mount production was 47430 microgram ̸ litter and 47460 microgram ̸ litter, respectively, and the optimum temperature was 30°C, PH 6, that the carotenoides a mount was 47470 microgram ̸ litter and 47670 microgr

... Show More
View Publication Preview PDF