Preferred Language
Articles
/
ijcpe-256
Using Microbubbles to Improve Transmission Oil in Pipes
...Show More Authors

Drag reduction (DR) techniques are used to improve the flow by spare the flow energy. The applications of DR are conduits in oil pipelines, oil well operations and flood water disposal, many techniques for drag reduction are used. One of these techniques is microbubbles.  In this work, reduce of drag percent occurs by using a small bubbles of air pumped in the fluid transported. Gasoil is used as liquid transporting in the pipelines and air pumped as microbubbles. This study shows that the maximum value of drag reduction is 25.11%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Lead Ions from Wastewater by using a Local Adsorbent from Charring Tea Wastes
...Show More Authors

   Adsorption of lead ions from wastewater by native agricultural waste, precisely tea waste. After the activation and carbonization of tea waste, there was a substantial improvement in surface area and other physical characteristics which include density, bulk density, and porosity. FTIR analysis indicates that the functional groups in tea waste adsorbent are aromatic and carboxylic. It can be concluded that the tea waste could be a good sorbent for the removal of Lead ions from wastewater. Different dosages of the adsorbents were used in the batch studies. A random series of experiments indicated a removal degree efficiency of lead reaching (95 %) at 5 ppm optimum concentration, with adsorbents R2 =97.75% for tea. Three mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Fri Jul 04 2025
Journal Name
Computational And Theoretical Chemistry
Coronene and BN isosters of coronene: Revealing the electron density distribution using magnetic shielding maps
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Aug 28 2016
Journal Name
World Journal Of Pharmacy And Pharmaceutical Sciences
AN INSIGHT ON THE IDENTIFICATION OF CANCER STEM CELLS USING NOVEL IMMUNOLOGICAL AND MOLECULAR STRATEGIES
...Show More Authors

Cancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and t

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
A Solution of Second Kind Volterra Integral Equations Using Third Order Non-Polynomial Spline Function
...Show More Authors

In this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 29 2016
Journal Name
Al- Mustansiriyah J. Sci.
The Approximate Solution of Newell Whitehead Segel and Fisher Equations Using The Adomian Decomposition Method
...Show More Authors

In the present work, we use the Adomian Decomposition method to find the approximate solution for some cases of the Newell whitehead segel nonlinear differential equation which was solved previously with exact solution by the Homotopy perturbation and the Iteration methods, then we compared the results.

View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Optimum Dimensions of Hydraulic Structures and Foundation Using Genetic Algorithm coupled with Artificial Neural Network
...Show More Authors

      A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Synthesis and evaluation of chalcone derivatives for antimicrobial and antioxidant activities using microwave-assisted methodology
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref