Preferred Language
Articles
/
dRYLw4sBVTCNdQwCNtxk
Biosynthesis, Characterization, and Applications of Bismuth Oxide Nanoparticles Using Aqueous Extract of Beta Vulgaris
...Show More Authors

Bismuth oxide nanoparticle Bi2O3NPs has a wide range of applications and less adverse effects than conventional radio sensitizers. In this work, Bi2O3NPs (D1, D2) were successfully synthesized by using the biosynthesis method with varying bismuth salts, bismuth sulfate Bi2(SO4)3 (D1) or bismuth nitrate. Penta hydrate Bi(NO3)3.5H2O (D2) with NaOH with beta-vulgaris extract. The Bi2O3NPs properties were characterized by different spectroscopic methods to determine Bi2O3NPs structure, nature of bonds, size of nanoparticle, element phase, presence, crystallinity and morphology. The existence of the Bi2O3 band was verified by the FT-IR. The Bi2O3 NPs revealed an absorption peak in the UV-visible spectrum, with energy gap Eg = 3.80eV. The X-ray pattern (D1) matching that of card of COD File-No-96-152-6459 indicating the presence of homogeneous Bi2O3NPs, Scaning Electron Microscopy (SEM) displayed shaped monoclinic phase with average diameter 30.28 nm. The size, structure and composition of synthetic Bi2O3 Nps were determined using the (EDX) pattern. The XRD pattern (D2) corresponds to JCPDS File No. 27-50. The SEM of D2 showed crystalline rhomobohedrral phase with average diameter 34.89 nm. The EDX for both (D1, D2) samples reveals an aggregation of thin sheet cluster. The antibacterial activity of Bi2O3NPs from (D1, D2) was tested against (G-) Escherichia coli and (G+) staphylococcus aureus. All of these clinical pathogens were examined for antifungal activity against Candida albicans fungus, and the results were compared with the standard medication. The adsorption experiment was successfully conducted on the following metal ions (M+2 = Co, Ni and Cu), where the results proved removal simultaneously from water using Bi2O3NPs (D1, D2) based on the affinity of three metal ions and Bi2O3 NPs surface shape. The removal efficiencies of mixed (M+2 = Co, Ni and Cu) ions for D1 were 89.68%, 85.56% and 94.5%. The removal efficiencies for D2 were 93.3%, 87.7% and 88.54%, respectively.

Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Eye Detection using Helmholtz Principle
...Show More Authors

            Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Effect of Maximum Size of Aggregate on the Behavior of Reinforced Concrete Beams Analyzed using Meso Scale Modeling
...Show More Authors

In this study, simply supported reinforced concrete (RC) beams were analyzed using the Extended Finite Element Method (XFEM). This is a powerful method that is used for the treatment of discontinuities resulting from the fracture process and crack propagation in concrete. The mesoscale is used in modeling concrete as a two-phasic material of coarse aggregate and cement mortar. Air voids in the cement paste will also be modeled. The coarse aggregate used in the casting of these beams is a rounded aggregate consisting of different maximum sizes. The maximum size is 25 mm in the first model, and in the second model, the maximum size is 20 mm. The compressive strength used in these beams is equal to 26 MPa.

The subje

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Using Six-Sigma to measure the quality performance of the Department of Statistics-University of Baghdad-Case Study
...Show More Authors

Abstract

            This research was to provide a definition of quality, dimensions and concepts, whether traditional or modern concept, as well as review the dimensions of quality in higher education and vision and mission with the overall objectives of the Statistics Department.

         After reviewing quality goals and purposes achieved as well as the mechanisms used to achieve them. and use standard Six-Sigma as one of the methodologies used in quality with the historical roots of using this methodology and methods applied and their definitions t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 08 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimating total dissolved solids and total suspended solids in Mosul dam lake in situ and using remote sensing technique
...Show More Authors

View Publication
Scopus (12)
Crossref (10)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (25)
Crossref