Preferred Language
Articles
/
eBiKXJQBVTCNdQwCThM3
Stability analysis for the phytoplankton-zooplankton model with depletion of dissolved oxygen and strong Allee effects
...Show More Authors

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
The Dynamics of Holling Type IV Prey Predator Model with Intra- Specific Competition
...Show More Authors

In this paper a prey-predator model involving Holling type IV functional response
and intra-specific competition is proposed and analyzed. The local stability analysis of
the system is carried out. The occurrence of a simple Hopf bifurcation is investigated.
The global dynamics of the system is investigated with the help of the Lyapunov
function and poincare-bendixson theorem. Finally, the numerical simulation is used to
study the global dynamical behavior of the system. It is observed that, the system has
either stable point or periodic dynamics.

View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
Iraqi Journal Of Science
Effects of Using Static Methods with Contourlet Transformation on Speech Compression
...Show More Authors

Compression of speech signal is an essential field in signal processing. Speech compression is very important in today’s world, due to the limited bandwidth transmission and storage capacity. This paper explores a Contourlet transformation based methodology for the compression of the speech signal. In this methodology, the speech signal is analysed using Contourlet transformation coefficients with statistic methods as threshold values, such as Interquartile Filter (IQR), Average Absolute Deviation (AAD), Median Absolute Deviation (MAD) and standard deviation (STD), followed by the application of (Run length encoding) They are exploited for recording speech in different times (5, 30, and 120 seconds). A comparative study of performance

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Emulsion Liquid Membrane for Pesticides Removal from Aqueous Solution: Emulsion Stability, Extraction Efficiency and Mass Transfer Studies
...Show More Authors

The current study investigated the stability and the extraction efficiency of emulsion liquid membrane (ELM) for Abamectin pesticide removal from aqueous solution. The stability was investigated in terms of droplet emulsion size distribution and emulsion breakage percent. The proposed ELM included a mixture of corn oil and kerosene (1:1) as a diluent, Span 80 (sorbitan monooleate) as a surfactant and hydrochloric acid (HCl) as a stripping agent without utilizing a carrier agent. Parameters such as homogenizer speed, surfactant concentration, emulsification time and internal to organic volume ratio (I/O) were evaluated. Results show that the lower droplet size of 0.9 µm and higher stable emulsion in terms of breakage percent of 1.12 % were

... Show More
Crossref (2)
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Emulsion Liquid Membrane for Pesticides Removal from Aqueous Solution: Emulsion Stability, Extraction Efficiency and Mass Transfer Studies
...Show More Authors

The current study investigated the stability and the extraction efficiency of emulsion liquid membrane (ELM) for Abamectin pesticide removal from aqueous solution. The stability was investigated in terms of droplet emulsion size distribution and emulsion breakage percent. The proposed ELM included a mixture of corn oil and kerosene (1:1) as a diluent, Span 80 (sorbitan monooleate) as a surfactant and hydrochloric acid (HCl) as a stripping agent without utilizing a carrier agent. Parameters such as homogenizer speed, surfactant concentration, emulsification time and internal to organic volume ratio (I/O) were evaluated. Results show that the lower droplet size of 0.9 µm and higher stable emulsion in terms of breakage percent of 1.12 % we

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Modeling and Forecasting Periodic Time Series data with Fourier Autoregressive Model
...Show More Authors

Most frequently used models for modeling and forecasting periodic climatic time series do not have the capability of handling periodic variability that characterizes it. In this paper, the Fourier Autoregressive model with abilities to analyze periodic variability is implemented. From the results, FAR(1), FAR(2) and FAR(2) models were chosen based on Periodic Autocorrelation function (PeACF) and Periodic Partial Autocorrelation function (PePACF). The coefficients of the tentative model were estimated using a Discrete Fourier transform estimation method. FAR(1) models were chosen as the optimal model based on the smallest values of Periodic Akaike (PAIC) and Bayesian Information criteria (PBIC). The residual of the fitted models was diagn

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Review Of International Geographical Education
Analysis of the agricultural insurance portfolio for the Iraqi National Insurance Company
...Show More Authors

The agricultural sector suffers from many risks and natural disasters, such as droughts and heavy rains that cause floods, as well as hail and agricultural pests, etc., that threaten agricultural activity and reduce it, which leads to the failure of farmers and peasants for fear of being subjected to continuous losses. Nevertheless, we notice almost complete reluctance to move towards agricultural insurance, due to the dependence of farmers on the government, which adopts the principle of compensation instead of agricultural insurance when natural disasters happen despite the difficulties and financial hardship as well as the suspicion of corruption that haunt the compensation process and this represents the most important problem for resea

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
The effects of devitrification on the lithium glass surface and microstructure
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF