Preferred Language
Articles
/
zRaD8osBVTCNdQwCo-ZN
Structure and performance of polyvinylchloride microfiltration membranes improved by green silicon oxide nanoparticles for oil-in-water emulsion separation

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
The study of the bending property of the epoxy (Ep / MgO) and (Ep/SiO2) composites in natural conditions and after immersion in chemical solution

In this paper, a polymer-based composite material was prepared by hand Lay-up method consisting of epoxy resin as a base material reinforced by magnesium oxide powder once and silicon dioxide powder again and with different weight ratios (3, 6, 9 and 12) wt %. The three-point bending test was performed in normal conditions and after immersion in sulfuric acid. The results showed that the bending value decreased with the increase of the weighted ratio of the reinforcement material (MgO, SiO2). The Bending of samples reinforced by SiO2 was found to be less than the bending of samples reinforced by particles (MgO). For example, the bending of the SiO2 sample (0.32 mm) at the weighted ratio (3%) and for the MgO (0.18mm) sample at the weight

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
New Generalizations for ΟΊ-Hyponormal Operators

     This article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H.  Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation  where  ,  has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.  

Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Proposed Algorithm for Gumbel Distribution Estimation

Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu

... Show More
Crossref
Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multiproduct Mathematical Model for Productive Company

This model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits

View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Path Planning Control for Mobile Robot

Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.

This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Risk Factors For Unintentional Childhood Poisoning

Objectives:   To   identify   child  or  family  related  risk  factors   for

unintentional childhood  poisoning in Sulaymaniyah, Iraq  and to suggest

possible causes and preventive measures.

Methods: This is an epidemiological description and a case-control study. The study was undertaken in Sulaymani ,in 2004-2005. Cases were 200 children who were admitted to the hospital for treatment of poisoning. For every case two controls  were selected. Al l   parents of the children were interviewed  by  using a  questionnaire  that  incl uded  demographic  and poisoning characteristic information.<

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 21 2012
Journal Name
Arabian Journal For Science And Engineering
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
View Publication