Preferred Language
Articles
/
joe-1329
Deasphalting of Atmospheric Iraqi Residue using Different Solvents
...Show More Authors

Different solvents (light naphtha, n-heptane, and n-hexane) are used to treat Iraqi Atmospheric oil residue by the deasphalting process. Oil residue from Al-Dura refinery with specific gravity 0.9705, API 14.9, and 0.5 wt. % sulfur content was used. Deasphalting oil (DAO) was examined on a laboratory scale by using solvents with different operation conditions (temperature, concentration of solvent, solvent to oil ratio, and duration time). This study investigates the effects of these parameters on asphaltene yield. The results show that an increase in temperature for all solvents increases the extraction of asphaltene yield. The higher reduction in asphaltene content is obtained with hexane solvent at operating conditions of (90 °C, 4/1 solvent to oil ratio), where the asphaltene yield was 93%. The highest recorded value of API value at 150 ml for all solvents at the highest temperature and duration time; this value is 32 when using n-heptane solvent at 15/1.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to compare between parametric and nonparametric transfer function model
...Show More Authors

In this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods  local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Citric Acid Production Using Wheat Bran by <i>Aspergillus niger</i>
...Show More Authors

This study aimed to obtain a local isolation of Aspergillus niger and then studied its ability to produce citric acid from raw materials available locally using solid state fermentation. Six local isolates were collected from different sources including some samples of the damaged fruits such as grapefruit, oranges and sindi. Wheat bran was used as a raw material or as culture medium for the production of citric acid from the collected isolates. The conditions for citric acid production were determined by humidity percentage of 1: 1 (water: culture medium), temperature of 28 C, pH 4 and inoculum dose with 5× 106 spore/ml and for 3 days of incubation. The orange was the best model for citric acid production with a concentration of 12.8 mg/m

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
2016 Asia-pacific Microwave Conference (apmc)
High selectivity microstrip bandpass filter using feedback CRLH-TL unit cell
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Using typographic patterns in commercial advertising design: عصام إبراهيم محمد الكبيسي
...Show More Authors

Typographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Economics And Administrative Sciences (jeas)
Using Statistical Methods to Increase the Contrast Level in Digital Images
...Show More Authors

This research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods

Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Proposing a Scheme for Human Interactive Proof Test using Plasma Effect
...Show More Authors

            Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref