Preferred Language
Articles
/
bsj-5921
Determining the Quality and Quantity of Bioethanol Production using Golden Shower (Cassica fistula) Fruit
...Show More Authors

Depletion of fossil fuel is one of the main reasons why the bioethanol has become popular. It is a renewable energy source. In order to meet the great demand of bioethanol, it is best that the bioethanol production is from cheap raw materials. Since the golden shower fruit is not being utilized and is considered as waste material, hence, this study was conducted to make use of the large volume of the residue as feedstock to test its potential for bioethanol extraction.The main goal of this study is to obtain the most volume of bioethanol from the golden shower fruit liquid residue by the factors, days of fermentation (3, 5, and 7 days) and sugar concentration (15, 20 and 25 brix) of the liquid residue. Also, part of the study is to compute the cost of production in extracting bioethanol from the golden shower fruit. Each treatment was replicated three (3) times. The Two-Factorial Analysis of Variance (ANOVA) of the Complete Randomized Design (CRD) was used to analyze the treatments. Treatments means were compared using the Duncan’s Multiple Range Test (DMRT).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Using the Critical Path Method to Find Time of Constriction for Helicopters Airport Project in the Oil Fields
...Show More Authors

This research is considered one of the important researches in Maysan Governorate, as it focuses on the construction of helicopter airport project in the oil fields of the Maysan Oil Company, where the oil general companies in Maysan Governorate suffer from the cost of transporting the foreign engineering experts and the governing equipment of sustaining oil industry from Iraq's international airports to oil fields and vice versa. Private international transport companies transport foreign engineering from the oil fields to Iraqi airports and vice versa, and other international security companies take action to provide protection for foreign engineering experts during transportation. Hence, this process is very costly.

 &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 29 2024
Journal Name
Iraqi Journal Of Science
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Machining Polylines and Ellipses using Three-Axis CNC Milling Machine
...Show More Authors

CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.

View Publication Preview PDF
Publication Date
Thu Dec 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Building Words Dictionary List Using Symbol Enumeration and Hashing Methodology
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Anterior Loop Presence and Extension Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors