Preferred Language
Articles
/
jcofarts-561
Evaluating Industrial Products emotionally by Using Emojis: محمد علي حسين القيسي
...Show More Authors

Researches in the field of evaluation of industrial products emotionally are internationally new and non-existing in the Arabic speaking countries, which is considered the crux of the problem in the current research, in addition to the need of the designers and design students to know how to measure the emotional responses for the industrial product in order to get benefit from them in their designs. The research objective is to get a tool that uses emojis in measuring the emotional responses for the products. The researcher designed an emotional verbal wheel and emojis wheel. The sample of the research consisted of (7) chairs different in design and use, and the respondents were (89) students. The most important results are:
1- Designing the sensory emotional circuit by the use of emojis.
2- Reaching at a sensory emotional description for the study samples

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Gold Nanoparticles by Aluminum as a Reducing Agent
...Show More Authors

             The synthesis of nanoparticles (GNPs) from the reduction of HAuCl4 .3H2O by aluminum metal was obtained in aqueous solution with the use of Arabic gum as a stabilizing agent. The GNPs were characterized by TEM, AFM and Zeta potential spectroscopy. The reduction process was monitored over time by measuring ultraviolet spectra at a range of λ 520-525 nm. Also the color changes from yellow to ruby red, shape and size of GNP was studied by TEM. Shape was spherical and the size of particles was (12-17.5) nm. The best results were obtained at pH 6.

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Constructing a Software Tool for Detecting Face Mask-wearing by Machine Learning
...Show More Authors

       In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Preparation of Industrial Greases from Aircraft Waste Oils
...Show More Authors

The aim of this research is to benefit from recycl the aircraft waste oils which is discarded in sewage network, to be used in preparation of greases for industrial purposes and to reduce the environmental pollution. In this research synthetic greases were prepared with special specifications by mixing the waste oils after treating with (silica gel as adsorbent agent, and filtration to precipitate impurities then heated to 110 C? to get rid of water) bentonite produced in Iraq which is available and cheap with existence of high density polyethylene at specific conditions of ( heating and mixing) . The best weight proportion were reached, then paraffin wax and additives were added to improve the properties of grease and give the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Remediation of Contaminated Soil with Petroleum Industrial Wastewater
...Show More Authors

The contamination of soil with the wastes of oil industry products that are complex mixtures of hydrocarbons increased recently due to the large development of oil industries in Iraq. This study deals with the remediation of low permeability contaminated clayey soil by using the enhanced electrokinetic technique (EK). The contaminated soil samples obtained from Thi-Qar oil refinery plant in Al-Nassyriah city, where the byproducts of refinery plant are disposed into that site. The byproduct contaminant treated as total petroleum hydrocarbons (TPH) to avoid dealing and complexity of treating the individual minerals and compounds consisting the contaminant. The initial concentrations of TPH were (702.7, 1168, 1235) ppm in the contaminated s

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 11 2019
Journal Name
Journal Of Mechanical Engineering Research And Developments
INDUSTRIAL TRACKING CAMERA AND PRODUCT VISION DETECTION SYSTEM
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Nov 28 2018
Journal Name
Arab Science Heritage Journal
الفقهية الفقيهة البغدادية ست الملوك فاطمه بنت علي بن علي (ت710/1310)
...Show More Authors

Did not The Baghdadi community in the seventh century thirteenth century AD was the appearance of a great scientists who have an important role in the intellectual movement at Baghdad in that period, despite the political corruption. Sit Al-melook Baghdadi is one of notables seventh century thirteen century AD who lived its events and interacted with these event, In spite of the lack of information in the historical sources wrote about what wrote about her refers to the assumption of a reputability place among scholars of its age.

View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Spectrophotometric and Spectrofluorimetric Determination of Terazosin in Tablets by Eosin Y
...Show More Authors

Simple, sensitive and accurate two methods were described for the determination of terazosin. The spectrophotometric method (A) is based on measuring the spectral absorption of the ion-pair complex formed between terazosin with eosin Y in the acetate buffer medium pH 3 at 545 nm. Method (B) is based on the quantitative quenching effect of terazosin on the native fluorescence of Eosin Y at the pH 3. The quenching of the fluorescence of Eosin Y was measured at 556 nm after excitation at 345 nm. The two methods obeyed Beer’s law over the concentration ranges of 0.1-8 and 0.05-7 µg/mL for method A and B respectively. Both methods succeeded in the determination of terazosin in its tablets

View Publication Preview PDF
Scopus Crossref