Preferred Language
Articles
/
ijp-65
Effect of chelating agents on removal of 137Cs from contaminated soil

In the present research, the chemical washing method has been selected using three chelating agents: citric acid, acetic acid and Ethylene Diamine Tetraacetic Acid (EDTA) to remove 137Cs from two different contaminated soil samples were classified as fine and coarse grained. The factors that affecting removal efficiency such as type of soil, mixing ratio and molarity have been investigated. The results revealed that no correlation relation was found between removal efficiency and the studied factors. The results also showed that conventional chemical washing method was not effective in removing 137Cs and that there are further studies still need to achieve this objective.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Real-time Ultraviolet Radiation Sensor Based on Modified Cladding Optical Fibers Technology

      In this work, the performance of single-mode optical fibers (SMFs) for ultraviolet (UV) radiation monitoring and dosimetry applications is presented. In particular, this work will focus on the Radiation-Induced Absorption (RIA) phenomena in the Near-Infrared domain (NIR). Such phenomena play a very important role in the sensing mechanism for SMF. Single mode fibers with a diameter of 50 µm were used for this purpose. These fibers were dipped into germanium (Ge) solution with different concentrations (1, 3, and 5 wt%) to produce the sensing part of the sensor. For all optical fiber sensors under investigation, the results indicated the dependence of the RIA on the applied UV radiation energy. Also, a redshi

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Imam Al-Zayla'i's Tracks on Imam Mardini   In his Banner Monument

The study of these selected traces shows that what Imam Mardini did on Imam al-Zayla'i and enabled him to graduate the hadiths of the book (guidance and conclusions) as well as in choosing the novel closest to Murad the work and not as described by al-Zayla'i .... never deserves descriptions.

View Publication Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
A Jordan Higher Reverse Left (resp. right) Centralizer on Prime -Rings

In this paper,  we introduce the concepts of  higher reverse left (resp.right)   centralizer, Jordan higher reverse left (resp. right) centralizer, and Jordan triple higher reverse left (resp. right) centralizer of  G-rings. We prove that every Jordan higher reverse left (resp. right) centralizer of a 2-torsion free prime G-ring M is a higher reverse left (resp. right) centralizer of  M.

Scopus (4)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu

... Show More
Scopus (8)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 09 2023
Journal Name
2023 15th International Conference On Developments In Esystems Engineering (dese)
Inverse Kinematics Optimization for Humanoid Robotic Legs Based on Particle Swarm Optimization

Calculating the Inverse Kinematic (IK) equations is a complex problem due to the nonlinearity of these equations. Choosing the end effector orientation affects the reach of the target location. The Forward Kinematics (FK) of Humanoid Robotic Legs (HRL) is determined by using DenavitHartenberg (DH) method. The HRL has two legs with five Degrees of Freedom (DoF) each. The paper proposes using a Particle Swarm Optimization (PSO) algorithm to optimize the best orientation angle of the end effector of HRL. The selected orientation angle is used to solve the IK equations to reach the target location with minimum error. The performance of the proposed method is measured by six scenarios with different simulated positions of the legs. The proposed

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biochemical and Kinetic Study on Serum Adenosine Deaminase Enzyme in P­ Thalassaemia

This study was conducted to investigate activity and some kinetic

and  thermodynamic  parameters  of  adenosine  deaminnse  (ADA)in

serum in patient affected with P-thalassaemia and compared with that of   healthy   individuals    .Serum   AD   levels   were   found   to   be significantly  higher  in  patient  with  P-thalassaemia  (98±9.15  IU/L) than in healthy  individuals (22± 2.04 IUIL)the study was carried in optimum pH value 6.5 and 37c  by which the enzyme possess highest activity .The study was concentrated to comprehensive  determina

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Steganography Based on Arabic Language Texts by Kashida Using STRI As RNG

One of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
On Light Mapping and Certain Concepts by Using m_X N-Open Sets

The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.

Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF