Preferred Language
Articles
/
ijcpe-385
POWER GENERATION FROM “PRO” PROCESS USING FLAT SHEET TFC–ULP KOCH MEMBRANES
...Show More Authors

The production of power using the process of pressure–retarded osmosis (PRO) has been studied both experimentally and theoretically for simulated sea water vs. river water and deionized water under two cases: the first is for simulated real conditions of sea water and river water and second under low brine solution concentration to examine the full profile of the power- pressure. The influence of concentration polarization (CP) on water flux has been examined as well.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS: SYNTHESIS AND CHARACTERIZATION OF NEW β-LACTAM DERIVATVE FROM SULFADIAZINE DRUG BY MANY STEPS
...Show More Authors

This research involved synthesis of new β-Lactam derivative from Azo compound[4-amino-N-(pyrimidine-2-yl)-3-(pyrimidine-2-yldiazenyl) benzene sulfonamide] (S1) record previously by many steps. Starting conversion the free amino group in an azo comp. to chloro acetamide derivative(S2), then reacted it with urea to give the oxazole ring  derivative (S3) that which containing free amino group. The condensation reaction between the amino group and P-bromobenzaldehyde to produce Shiff base (B14). Finally staudinger's cyclo addition reaction go run between the Shiff base derivative (B14) and chloro acetyl chloride in the presence of tri ethyl amine (Et3N) as Base catalyst and dioxane a

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The Synbiotic Effect Of Volaticle Oil Extracted From Leaves Rosmarinus Officinolis And Nigella Sativa: The Synbiotic Effect Of Volaticle Oil Extracted From Leaves Rosmarinus Officinolis And Nigella Sativa
...Show More Authors

The objective of present study was to investigate the effect of using mixture volaticle oil of rosmarinus and nigella sativa to improve some of the meat quality characteristics, physical and limited storage time of minced cold poultry meat. Duplex volaticle oil was added at 0.025, 0.050 and 0.075 g/kg to minced poultry meat, these treatments were stored individually for 0 , 4 and 7 days at 4-7C0. After making several chemical, physical and oxidation indicators, the following results were obtained:

            The process of adding volaticle oil to minced poultry meat led to significant increase (P<0.01)in moisture, prot

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Minimization of Toxic Ions in Waste Water Using Emulsion Liquid Membrane Technique
...Show More Authors

In the present study, the removal of zinc from synthetic waste water using emulsion liquid membrane extraction technique was investigated. Synthetic surfactant solution is used as the emulsifying agent. Diphenylthiocarbazon (ditizone) was used as the extracting agent dissolved in carbon tetrachloride as the organic solvent and sulfuric acid is used as the stripping agent. The parameters that influence the extraction percentage of Zn+2 were studied. These are the ratio of volume of organic solvent to volume of aqueous feed (0.5-4), ratio of volume of surfactant solution to volume of aqueous feed (0.2-1.6), pH of the aqueous feed solution (5-10), mixing intensity (100-1000) rpm, concentration of extracting agent (20-400) ppm, surfactant co

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref