Preferred Language
Articles
/
fxdHa5ABVTCNdQwC94nJ
MEASURING VIBRATION AT TRACTOR PLATFORM , STEERING WHEEL AND SEAT EFFECTIVE AMPLITUDE TRANSMISSIBILITY FACTOR DURING OPERATION TILLAGE
...Show More Authors

Field experiment conducted to measure vibrations on three axes longitudinal X, lateral Y and vertical Z on steering wheel, platform tractor and vertical vibration in seat tractor and seat effective amplitude transmissibility (SEAT) factor during operation tillage in silt clay loam soil with depth 18 cm in Baghdad. Split – split plot design under randomized complete block design with three replications least significant design 5 % used. Three factor were used in this experiment included two types of plows included chisel and disc plows which represented main plot, three tires inflation pressure was second factor included 1.1 ,1.8 and 2.7 bar, and three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Results showed disc plow recorded higher vibration values for three axes X,Y and Z on platform, steering wheel and vertical vibration seat tractor. No significant effect between chisel and disc plows in (SEAT) Factor. Tier pressure 2.7 bar recorded higher vibration values in all measurements. Speed tractor 6.50 km/hr recorded higher vibration values in all measurements. Vibration values increasing when increasing tiers inflation pressure and tractor speed. All interaction among treatments significant. Level of vibration in these experiment a cross legislated permissible vibration exposure limits in the world except the vibration transmitted to steering wheel and tractor seat during tillage under 1.1 bar and tractor speed 2.35 km/hr

Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Bioadsorption of Heavy Metals From Industrial Wastewater Using Some Species of Bacteria
...Show More Authors

Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of Knowledge Management System Requirements According to ISO 30401
...Show More Authors

This Paper assesses the knowledge management system (KMS) requirements at Al-Ameed University concerning ISO 30401:2022. Specifically, the research aims to ascertain the degree to which international standards have been complied with and gaps that have been identified. A case study was conducted using field observations, interviews, and checklists to assess the institution's compliance with the KMS framework. The level of implementation and documentation of knowledge management processes was assessed using a seven-point scale. The findings reveal that Al-Ameed University has severe gaps in knowledge creation, sharing, and support for knowledge management in terms of strategic leadership. While certain elements like availability of r

... Show More
View Publication
Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Bubble Size Distribution In Gas-Liquid Dispersion Column
...Show More Authors

The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
The Terrorist Project in Terms of the Agreement
...Show More Authors

Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
The antibacterial activity of indium oxide thin film prepared by thermal deposition
...Show More Authors

Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF