Preferred Language
Articles
/
0Bd_bI4BVTCNdQwCv0cE
Photodegradation of tetracycline antibiotic by ternary recyclable Z-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 photocatalyst with improved charge separation efficiency: Characterization and mechanism studies
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Speaker Verification Using Hybrid Scheme for Arabic Speech
...Show More Authors

In this work , a hybrid scheme tor Arabic speech for the recognition

of  the speaker  verification  is presented  . The scheme is hybrid as utilizes the traditional digi tal signal processi ng and neural network . Kohonen neural  network has been used as a recognizer  tor speaker verification after extract spectral  features from an acoustic signal  by Fast Fourier Transformation Algorithm(FFT) .

The system was im plemented using a PENTIUM  processor , I000

MHZ compatible and MS-dos 6.2 .

 

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Iraqi Journal Of Applied Physics
Fabrication of PAN:Cellulose Membrane for Oil/Water Separation
...Show More Authors

In this study, we fabricated nanofiltration membranes using the electrospinning technique, employing pure PAN and a mixed matrix of PAN/HPMC. The PAN nanofibrous membranes with a concentration of 13wt% were prepared and blended with different concentrations of HPMC in the solvent N, N-Dimethylformamide (DMF). We conducted a comprehensive analysis of these membranes' surface morphology, chemical composition, wettability, and porosity and compared the results. The findings indicated that the inclusion of HPMC in the PAN membranes led to a reduction in surface porosity and fiber size. The contact angle decreased, indicating increased surface hydrophilicity, which can enhance flux and reduce fouling tendencies. Subsequently, we evaluated the e

... Show More
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Surface Modification of the Improved Stainless Steel Alloy AISI-304 and the Use of Diffusion Coating and a Study of Its Efficiency in Resistivity Hot Corrosion in an Atmosphere of Sodium Chloride Vapor NaCL and Sodium SulfateNa_2 SO_4
...Show More Authors

       This research aims to modify the components of stainless steel alloy by the method of surface engineering through the single diffusion coating technique in order to obtain new alloys with high efficiency in resisting harsh environmental conditions. Steam a mixture of sodium chloride ( ) and sodium sulfate ( ) at a temperature of 900 and then compare it with the base alloy. The results showed that the alloys produced in this way are very efficient. The results showed that the aluminum coating showed high efficiency in resisting oxidation and provided better protection for a longer time compared to the uncoated alloy due to the  oxide crust layer formed with high adhesion as well as the aluminum-rich phases, whether the phase

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Process Variables, Adsorption Kinetics and Equilibrium Studies of Hexavalent Chromium Removal from Aqueous Solution by Date Seeds and its Activated Carbon by ZnCl2
...Show More Authors

The adsorption of hexavalent chromium by preparing activated carbon from date seeds with zinc chloride as chemical activator and granular date seeds was studied in a batch system. The characteristics of date seeds and prepared activated carbon (ZAC) were determined and found to have a surface area 500.01 m2/g and 1050.01  m2/g , respectively and  iodine number of 485.78 mg/g and 1012.91  mg/g, respectively. The effects of PH value (2-12), initial sorbate concentration(50-450mg/L), adsorbent weight (0.004-0.036g) and contact time (30-150 min) on the adsorption process were studied . For Cr(VI) adsorption on ZAC, at 120 min time contact, pH solution 2 and 0.02  adsorbent  weight  will ach

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 07 2019
Journal Name
Journal Of Pharmaceutical Sciences And Research
Synthesis, Spectral Studies and Microbial Evaluation of Azo Dye Ligand Complexes with Some Transition Metals
...Show More Authors

1-(4-amino-3-(benzo[d]thiazol-2-yldiazenyl)phenyl)ethanone has been synthezied by reaction the diazonium salt of 2-aminobenzothiazole with 4-aminoacetophenone. Specroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR) and microelemental analysis (C.H.N.S.O) are use to identified of the azo ligand. Metal chelates of some transition metals were performed as well depicted. Complexes were identified using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4 - 3×10-4 mol/L). height molar absorbtivity of compoun

... Show More
Publication Date
Fri May 14 2010
Journal Name
Al-mustansiriyah
Synthesis, Spectroscopic and Biological Studies of Some Metal Complexes with 1, 2 bis-(orthoaminophenylthio) ethane
...Show More Authors

Publication Date
Sat Dec 15 2018
Journal Name
Research Journal Of Pharmaceutical, Biological And Chemical Sciences
Synthesis, Spectroscopic and Antimicrobial Studies of Mixed Ligand Metal (II) Complexes with three amino acids
...Show More Authors

The research includes synthesis and identification of novel three amino acids ligands complexes of some heavy metal (II) ions by using the amino acids like glycine, L-alanine and L-valine. New metal mixed ligand complexes with amino acids are prepared the reaction by reacting the three amino acids with the metals(II) chloride by using 50% ethanolic solution and 50% distall water in the molar ratio [1:1:1:1] ( M:Gly:Ala:Val) except for Co(II) and Ni(II) complexes were found after diagnosis the coordination with both Lalanine and L-valine. The prepared complexes identified by using physical properties, flame atomic absorption and conductivity measurements, in addition, mass, FT.IR and UV.vis spectrum as well magnetic moment data. The general

... Show More
Publication Date
Fri Oct 04 2024
Journal Name
Chemical Review And Letters
Newly designed 2-(aminomethyl)benzimidazole derivatives as possible tyrosine kinase inhibitors: synthesis, characterization, preliminary cytotoxic evaluation and in Silico studies
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More