Preferred Language
Articles
/
bsj-6452
Modeling Jar Test Results Using Gene Expression to Determine the Optimal Alum Dose in Drinking Water Treatment Plants
...Show More Authors

Coagulation is the most important process in drinking water treatment. Alum coagulant increases the aluminum residuals, which have been linked in many studies to Alzheimer's disease. Therefore, it is very important to use it with the very optimal dose. In this paper, four sets of experiments were done to determine the relationship between raw water characteristics: turbidity, pH, alkalinity, temperature, and optimum doses of alum [   .14 O] to form a mathematical equation that could replace the need for jar test experiments. The experiments were performed under different conditions and under different seasonal circumstances. The optimal dose in every set was determined, and used to build a gene expression model (GEP). The models were constructed using data of the jar test experiments: turbidity, pH, alkalinity, and temperature, to predict the coagulant dose. The best GEP model gave very good results with a correlation coefficient (0.91) and a root mean square error of 1.8. Multi linear regression was used to be compared with the GEP results; it could not give good results due to the complex nonlinear relation of the process. Another round of experiments was done with high initial turbidity like the values that comes to the plant during floods and heavy rain. To give an equation for these extreme values, with studying the use of starch as a coagulant aid, the best GEP gave good results with a correlation coefficient of 0.92 and RMSE 5.1

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The Technical Treatment for Pottery Body by (Kintsugi) Technique in Japanese Pottery – Analytic Study
...Show More Authors

The aesthetic and technical expertise help  in producing the artistic work and achieving results in aesthetic formulations that reflect the aesthetic and  expressive dimensions and the reflective dimensions of the pottery, surpassing its traditions, asserting  its active presence in life, cherishing it  even when it  breaks  or get damaged   by employing techniques that are originated  from  the Japanese environment.

                       The research problem is to study how ( Kintsugi) technique and similar techniques are used to create  new rebirths of pottery piec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of the Boilers at Al-Mussaib Thermal Station
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Immunohistochemical Assessment of SOX2 Expression in Iraqi Patients with Gastric Carcinoma (GC)
...Show More Authors

Objective: To evaluate whether the SOX2 protein could be used as a predictor in patients with GC and to assessment the correlation between the IHC expression of the SOX2 protein and the various clinic pathological Parameters as age, sex, histopathological subtypes, grade and stage of the tumor by immune-histochemical Technique. This is a retrospective study conducted on 60 randomly selected patients (30) normal versus (30) GC, at the pathology department of the Gastroenterology and Hepatology Teaching Hospital & some private hospitals. It were collected and diagnosed during the period between from 2014 to 2018. From each block were stained with H&E and IHC stained for SOX2. The Statistical analysis was done using SPSS system, and the differ

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Clinical And Diagnostic Research
Immunohistochemical Expression of HER2/neu Receptors in Iraqi Patients with Endometrioid Carcinoma
...Show More Authors

Introduction: With the advent of era of targeted cancer therapy, the serious side effects of chemoradiotherapy have been minimised. Considering the success story of anti-HER2/neu drugs in breast cancer oncology, the present study was conducted. The study evaluates the immunohistochemical expression of HER2/neu in endometrioid cancer among Iraqi patients. Aim: To assess the immunohistochemical expression of HER2/neu in endometrioid carcinoma of uterus and to find the relationship of this expression with FIGO stage and grade and with patient age. Materials and Methods: In this cross sectional study, formalin-fixed, paraffin-embedded tissue blocks of 62 hysterectomy specimens that were diagnosed as endometrioid carcinoma in the teaching labora

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Variation in Immunohistochemical Expression of Neuropilin1 among Oral, Laryngeal and Skin SCC
...Show More Authors

ABSTRACT Background: Neuropilin 1(NRP1) is considered a novel non - tyrosine kinase co- receptor for the vascular endothelial growth factors (VEGF). First discovered on migrating neurons. NRP1is suggested to be up-regulated in cells of different types of cancer and implicated with advanced disease. The aim of this study was to investigate the variation in expression of NRP1 in oral, laryngeal and skin squamous cell carcinoma. Materials and methods: Tissue sections from 120 formalin fixed- paraffin embedded blocks histopathologically diagnosed as oral, laryngeal and skin SCC (40 blocks for each),immunohistohemically stained in immunoperoxidase method with monoclonal antibodies to NRP1, the localization of expression was examined and the res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2017
Journal Name
British Journal Of Cancer
Aurora B expression modulates paclitaxel response in non-small cell lung cancer
...Show More Authors

View Publication
Scopus (47)
Crossref (41)
Scopus Clarivate Crossref