Preferred Language
Articles
/
oxiMApcBVTCNdQwCnJSZ
Porosity Measurements of Positive of Lead-Acid Battery Plates by Mercury PSorosimetry
...Show More Authors

A mercury porosimeter has been used to measure the intrusion volume of the three types mercury positive lead acid-battery plates. The intrusion volumes were used to calculate the pore diameter, pore volume, pore area, and pore size distribution. The variation of the pore area in positive lead acid-battery plates as well as of the pore volume has the following sequence. Paste positive > Uncured positive > Cured positive

Crossref
View Publication
Publication Date
Sat Jul 05 2025
Journal Name
Al-nahrain Journal Of Science
INTRUSION WINDOWS XP BY BACKDOOR TOOL
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
WISDOM AND ITS CAUSE BY FUNDEMENTALISTS
...Show More Authors

Allah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Hydrodesulfurization of Iraqi Atmospheric Gasoil by Ti-Ni-Mo/γ-Al2O3 Prepared Catalyst
...Show More Authors

This study investigates the improvement of Iraqi atmospheric gas oil characteristics which contains 1.402 wt. % sulfur content and 16.88 wt. % aromatic content supplied from Al-Dura Refinery by using hydrodesulfurization (HDS) process using Ti-Ni-Mo/γ-Al2O3 prepared catalyst in order to achieve low sulfur and aromatic saturation gas oil. Hydrodearomatization (HDA) occurs simultaneously with hydrodesulfurization (HDS) process. The effect of titanium on the conventional catalyst Ni-Mo/γ-Al2O3 was investigated by physical adsorption and catalytic activity test.Ti-Ni-Mo/γ-Al2O3 catalyst was prepared under vacuum impregnation condition to ensure efficient pr

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculations For Sputtering Yield of Nickel Surface Hitted By Xenon Plasma Ions
...Show More Authors

Extended calculations for sputtering yield through bombed Nickel – target by Xenon ions plasma are accomplished. The calculations include changing the input parameters: the energy of xenon ions plasma, the hit target angle of nickel target, thickness of the nickel target layer, and the slight change in the surface binding energy of Nickel. The program TRIM is used to accomplish these calculations. The results show that the sputtering yields directly dependent on these parameters. The change in angles of incidence plasma ions and energy leads to a significant change in the sputtering yields. On the other hand, the sputtering yields ore highly affected by changing target width and surface binding energy at fixed ion parameters.

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
The Education Faculty Journal Of Baghdad University
Analyzing the Rhetorical Structure of Linguistics Dissertation Abstracts Written by Iraqi EFL Graduates
...Show More Authors