Preferred Language
Articles
/
ijcpe-358
Improved Method to Correlate and Predict Isothermal VLE Data of Binary Mixtures
...Show More Authors

Accurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equilibrium data point with very good accuracy. The developments of this method are applied on 13 binary systems at different temperatures which gives very good accuracy.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 27 2020
Journal Name
Asian Journal Of Civil Engineering
Using measured mile method to quantify the loss of labor productivity in Iraqi construction site
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Dynamic Behavior of Pb(II) and Cr(III) Biosorption onto Dead Anaerobic Biomass in Fixed-Bed Column, Single and Binary Systems
...Show More Authors

The biosorption of lead (II) and chromium (III) onto dead anaerobic biomass (DAB) in single and binary systems has been studied using fixed bed adsorber. A general rate multi- component model (GRM) has been utilized to predict the fixed bed breakthrough curves for single and dual- component system. This model considers both external and internal mass transfer resistances as well as axial dispersion with non-liner multi-component isotherm (Langmuir model). The effects of important parameters, such as flow rate, initial concentration and bed height on the behavior of breakthrough curves have been studied. The equilibrium isotherm model parameters such as maximum uptake capacities for lead (II) and chromium (III) were found to be 35.12 and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O<sub>2</sub> and their mixtures by using EEDF program
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Measurement: Sensors
Improved airborne computer system strategy for swarm drones flying based on skybrush suite and inspired technique
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Evaluation of Bearing Capacity of Strip Foundation Subjected to Eccentric Inclined Loads Using Finite Element Method
...Show More Authors

In real conditions of structures, foundations like retaining walls, industrial machines and platforms in offshore areas are commonly subjected to eccentrically inclined loads. This type of loading significantly affects the overall stability of shallow foundations due to exposing the foundation into two components of loads (horizontal and vertical) and consequently reduces the bearing capacity.

Based on a numerical analysis performed using finite element software (Plaxis 3D Foundation), the behavior of model strip foundation rested on dry sand under the effect of eccentric inclined loads with different embedment ratios (D/B) ranging from (0-1) has been explored. The results display that, the bearing capacity of st

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 04 2015
Journal Name
International Journal Of Advanced Technology In Engineering And Science
SYNTHESIS OF ZNO QUANTUM DOT BY SELF ASSEMBLY METHOD AND ZNO NANOROD BY HYDROTHERMAL METHOD
...Show More Authors

In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref