Preferred Language
Articles
/
6hYBDIcBVTCNdQwCujID
Studying collapse potential of gypseous soil treated by grouting
...Show More Authors

Crossref
View Publication
Publication Date
Fri Feb 17 2012
Journal Name
Smart Materials And Structures
Frequency tuning of piezoelectric energy harvesters by magnetic force
...Show More Authors

View Publication
Scopus (108)
Crossref (97)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
REMOVAL OF PHENOLIC COMPUNDS FROM AQUEOUS SOLUTIONS BY ADSOPTION ONTO ACTIVTED CARBONS PREPARED FROM DATE STONES BY CHEMICAL ACTIVATION WITH FeCl3
...Show More Authors

Activated carbon prepared from date stones by chemical activation with ferric chloride (FAC) was used an adsorbent to remove phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) from aqueous solutions. The influence of process variables represented by solution pH value (2-12), adsorbent to adsorbate weight ratio (0.2-1.8), and contact time (30-150 min) on removal percentage and adsorbed amount of Ph and PNPh onto FAC was studied. For PNPh adsorption,( 97.43 %) maximum removal percentage and (48.71 mg/g) adsorbed amount was achieved at (5) solution pH,( 1) adsorbent to adsorbate weight ratio, and (90 min) contact time. While for Ph adsorption, at (4) solution pH, (1.4) absorbent to adsorbate weight ratio, and (120 min) contact

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Six Thinking Hats Strategy on the Development of Essay Writing Skills and Creativity in It among Persian-Speaking Students Who are Studying Arabic Language and Literature At Shiraz University: Literature and Humanities, Shiraz University
...Show More Authors

The study aims to investigate the effect of the Six Thinking Hats Strategy on the achievement of essay writing skills among third-year students in Arabic Language and Literature who are Persian speakers enrolled in the course of Essay Writing (III) at Shiraz University for the academic year 2019-2020. The sample of the study consisted of (15) male and female students who were taught according to the pre-posttest, using the quasi-experimental approach. After applying the statistical analysis on the scores of the post-test, the results showed that there are statistically significant differences in the average of students' achievement in the skills of essay writing in terms of using the Six Thinking Hats Strategy. The results also proved th

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 21 2025
Journal Name
Al-nahrain Journal Of Science
INTRUSION WINDOWS XP BY BACKDOOR TOOL
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
WISDOM AND ITS CAUSE BY FUNDEMENTALISTS
...Show More Authors

Allah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 21 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SPECTROPHTOTOMETRIC DETERMINATION OF PURE SULFAMETHOXAZOLE IN PHARMACEUTICAL PREPARATIONS BY OXIDATIVE COUPLING REACTION: SPECTROPHTOTOMETRIC DETERMINATION OF PURE SULFAMETHOXAZOLE IN PHARMACEUTICAL PREPARATIONS BY OXIDATIVE COUPLING REACTION
...Show More Authors

            A new, simple, rapid and sensitive spectrophotometric method for the determination of sulfamethoxazole in both pure form and pharmaceutical preparations has been reported.The adapted technique based on utilization 4-aminobenzene sulfonic acid as a new modern chromogenic through an oxidative coupling reaction with sulfamethoxazole and potassium iodate in basic media to form orange soluble dye product with absorption maxima at 490 nm. Subject to Beer's law in the range 2–32μg mL-1. The values of molarabsorption coefficient (ε) and correlation coefficient were found to be 9.118 × 103 and0.9999 respectively whereas the Sandels index was

... Show More
View Publication Preview PDF