Preferred Language
Articles
/
ijcpe-258
Extraction of Essential Oils from Citrus By-Products Using Microwave Steam Distillation
...Show More Authors

The main objectives of this research is to extract essential oil from: orange ( citrus sinensis), lemon( citrus limon) and mandarin( citrus reticulata) peels by two methods: steam distillation (SD) and microwave assisted steam distillation (MASD), study the effect of extraction conditions (weight of the sample, extraction time, and microwave power, citrus peel type) on oil yield and compare the results of the two methods, the resulting essential oil was analyzed by Gas Chromatography (GC).

   Essential oils are highly concentrated substances used for their flavor and therapeutic or odoriferous properties, in a wide selection of products such as foods, medicines and cosmetics. Extraction of essential oil is one of the most time and effort consuming process. Microwave-assisted extraction is a green technique for the extraction of natural products. (MASD) was better than (SD) in terms of rapidity, energy saving and yield. (MASD) gave higher yield than (SD) with shorter extraction time, yield of orange oil extracted by (MASD) was (1.150%) in (35min.) compared to (1.095%) in (45min.) by (SD) process, same results obtained for lemon and mandarin.

   The optimal microwave power was (135W) gave oil yield: (1.150%, 1.115%, 0.940%) for orange, lemon and mandarin respectively, (MASD) increased extraction temperature in short time and to a higher level compared to (SD). The optimal weight was (398.56gm) gave yield in (SD): (1.095%) and MASD (1.091%) for orange oil, same results obtained for lemon and mandarin. The best citrus peel type which gave the highest yield was orange followed by lemon then mandarin in both processes.

Limonene is the most abundant component in citrus essential oil, (GC) analysis showed that (SD) was more convenient to give high amount of limonene because of the graduate temperature rise, while in microwave extraction exposure to low microwave

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Problems and needs of Baghdad university students from perspective of college of political sciences and college of engineering’s students
...Show More Authors

The current research aims to identify the problems and needs for both college of political science and college of engineering’s students. The sample was (100) male and female student. The results showed bunch of problems which could be organized descendingly, the scientific domain ranged between (2 - 2.42), the mean of the psychological domain was (2.85), the moral domain ranged between (2.2 – 2.28)m the problems of study earned (2.30), the material domain got (1.95), the medical and social domain obtained (1.925), and finally, the family domain received (1.887).

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
The Potential of Recycling Used Engine Oil for Biogas Generation by Co-Digestion with Animals’ Manure: Experimental and Kinetic Study
...Show More Authors

This study investigates the potential of biogas recovery from used engine oil (UEO) by co-digestion with animals’ manure, including cow dung (CD), poultry manure (PM), and cattle manure (CM). The experimental work was carried out in anaerobic biodigesters at mesophilic conditions (37°C). Two groups of biodigesters were prepared. Each group consisted of 4 digesters. UEO was the main component in the first group of biodigesters with and without inoculum, whereby a mix of UEO and petroleum refinery oily sludge (ROS) was the component in the second group of biodigesters. The results revealed that for UEO-based biodigesters, maximum biogas production was 0.98, 1.23, 1.93, and 0 ml/g VS from UEO±CD, UEO±CM, UEO±PM, and U

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 05 2021
Journal Name
International Journal Of Research In Social Sciences & Humanities
THE SCIENCES OF THE QUR’AN IN THE INTERPRETATION OF A BRIGHTENING OF THE QUR’AN BY AL-TALAQANI
...Show More Authors

The paper deals with the study of the sciences of the Qur’an according to the interpreter, Ayatollah Sayyid Mahmoud al-Talaqani, a religious jihadist figure from Iran. He is the author of the exegesis (Ishraq from Al-Quran), which consists of six parts, which he wrote inside the prisons of the Shah and in exile. Mr. Al-Talaqani agreed with some of the commentators in his positions on the sciences of the Qur’an, and some of them disagreed with others.

Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref