Preferred Language
Articles
/
bsj-7650
Design and construction of anair pollution detection system using a laser beam and absorption spectroscopy
...Show More Authors

Air pollution is one of the important problems facing Iraq. Air pollution is the result of uncontrolled emissions from factories, car exhaust electric generators, and oil refineries and often reaches unacceptable limits by international standards. These pollutants can greatly affect human health and regular population activities. For this reason, there is an urgent need for effective devices to monitor the molecular concentration of air pollutants in cities and urban areas. In this research, an optical system has been built consisting of aHelium-Neonlaser,5mWand at 632.8 nm, a glass cell with a defined size, and a power meter(Gentec-E-model: uno) where a scattering of the laser beam occurs due to air pollution. Two pollutants were examined: water vapor and smoke. Experiments were conducted using these pollutants to calibrate the system and determine its detection sensitivity. With this technique the absorption coefficients, types of pollutants and their concentrations were determined.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 19 2017
Journal Name
International Journal Of Science And Research
Volumetric Change of Concrete Containing Water Absorption Polymer Balls
...Show More Authors

Polymers have the ability to extract water after they have been added to the mortar or concrete mixture. They provide the absorbed water during hydration functioning as internal water source. Absorption polymers can absorb up to hundred times of their own weight of pure water.This research deals with the use of water absorption polymer balls in concrete and study the volumetric change of these mixes and compared the results with reference mix (without polymers). Samples were cured both in air and in water for the mixes to compare results which show that samples in air behave for expansion while sample in water acted for shrinkage.

Publication Date
Thu Sep 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Control of Calcium Scale and Corrosion of Medical City Cooling Water System using Sulfuric Acid
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Organization, Technology And Management In Construction: An International Journal
Using the ordinal priority approach for selecting the contractor in construction projects
...Show More Authors
Abstract<p>Effective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 02 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Study Of Angiogenesis In Human Colorectal Tumors By Using Anti-Cd34 Antibody. (Assessment By Light Microscope And Computer–Aided Image Analysis System)
...Show More Authors

Background:
Angiogenesis plays a crucial role in tumorigensis; several reports have described a significant increase in microvessel density (MVD) in colorectal carcinogenesis There are
several methods to measure the angiogenesis in neoplasms, but immunohitochemistry seems to be the mainstay of all. This method enable us to measure the tumor microvessel densities highlighted by using antibodies directed against endothelial cell markers like CD31,CD34 or others; then assessment of MVD by manual count of the number of microvessels in what appears to be the most vascular area of the tumor(called the hot spot) using a protocol described by Weidner et al.Automated cellular imaging system is used to analyze

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Identification of an unknown person using Y-chromosome markers and mitochondrial dna typing
...Show More Authors

Background: The present article is concerned within the scope of Forensic Medicine, specifically Forensic Genetics. The case was taken care of in the Genetic-Molecular Laboratory of the Odessa Regional Bureau of Forensic-Medical Examinations, in Ukraine, during January and February of 2014.
Objectives: The aim of our work was to identify an unknown person, using the techniques: Y-chromosome markers and mitochondrial DNA typing.
Materials and methods: The materials available for our procedure were: pieces of tissue in paraffin blocks, saved from the corpse of the unknown person; blood from a living male subject, who claimed to be the grandfather, and from two females, allegedly the sisters. From all of them we extracted nuclear DNA

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
An Experimental Assessment of Iraqi Local Cement and Cement Slurry Design for Iraqi Oil Wells Using Cemcade
...Show More Authors

This effort is related to describe and assess the performance of the Iraqi cement sample planned for oil well-cementing jobs in Iraq. In this paper, major cementing properties which are thickening time, compressive strength, and free water in addition to the rheological properties and filtration of cement slurry underneath definite circumstances are experimentally tested. The consequences point to that the Iraqi cement after special additives encounter the requests of the API standards and can consequently is used in cementing jobs for oil wells. At this research, there is a comparative investigation established on experimental work on the effectiveness of some additives that considered as waste materials which are silica fume, baux

... Show More
View Publication
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
An Experimental Assessment of Iraqi Local Cement and Cement Slurry Design for Iraqi Oil Wells Using Cemcade
...Show More Authors

This effort is related to describe and assess the performance of the Iraqi cement sample planned for oil well-cementing jobs in Iraq. In this paper, major cementing properties which are thickening time, compressive strength, and free water in addition to the rheological properties and filtration of cement slurry underneath definite circumstances are experimentally tested. The consequences point to that the Iraqi cement after special additives encounter the requests of the API standards and can consequently is used in cementing jobs for oil wells. At this research, there is a comparative investigation established on experimental work on the effectiveness of some additives that considered as waste materials which are silica fume, bauxite,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 23 2021
Journal Name
Iraqi Journal Of Science
Design and Performance Analysis of Spiral Solar Water Heater Using Iron Plate/Sand Absorber for Domestic Use
...Show More Authors

The sun which is all energy sources, in today's society, hot water is used for various purposes starting from household to power production. People are adopting various ways to accomplish these goals, such as firewood heat and electrical power, so solar energy is an alternative to the dwindling resources of fossil fuels. Conversion of solar radiation into heat is one of the simplest and most direct applications of this energy, it can be used to heat water systems. A widely used flat-plate solar collector. In this study we have come to heat water using solar energy. This research presents the design and experimental analysis for using Spiral Flow Solar Water Heater (SFSWH) to enhance the thermal efficiency of a flat plate solar collector.

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus Crossref