Preferred Language
Articles
/
7xY7CYsBVTCNdQwCtMbF
Photo-Fenton-like degradation of direct blue 15 using fixed bed reactor containing bimetallic nanoparticles: Effects and Box–Behnken optimization
...Show More Authors

This study involved the treatment of textile wastewater contaminated with direct blue 15 dye (DB15) using a heterogeneous photo-Fenton-like process. Bimetallic iron/copper nanoparticles loaded on bentonite clay were used as heterogeneous catalysts and prepared via liquid-phase reduction method using eucalyptus leaves extract (E-Fe/Cu@BNPs). Characterization methods were applied to resultant particles (NPs), including SEM, BET, and FTIR techniques. The prepared NPs were found with porous and spherical shapes with a specific surface area of particles was 28.589 m2/g. The effect of main parameters on the photo-Fenton-like degradation of DB15 was investigated through batch and continuous fixed-bed systems. In batch mode, pH, H2O2 dosage, DB15 concentration, and UV intensity were investigated. In contrast, the flow rate, E-Fe/Cu@BNPs height, DB15 concentration, and UV intensity were examined in the fixed-bed column. The response surface methodology based on the Box–Behnken design (BBD) was used to optimize both studied systems. The batch results showed that 100 mg/L of DB15 was completely degraded within 60 min with optimum pH 3.5, H 2 O 2 dosage of 7.5 mmol/L, and UV intensity of 15 W/m2. The kinetic study indicated that the DB15 degradation was fitted to the second-order kinetic model. The optimized parameters for the fixed-bed system were determined as 1mL/min, 1 cm, 100 mg/L, and 15 W/m2 for flow rate, E-Fe/Cu@B-NPs height, DB15 concentration, and UV intensity.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Temperature on the Synthesis of Nano-Gamma Alumina Using Hydrothermal Method
...Show More Authors

Nano gamma alumina was prepared by double hydrolysis process using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, hydroxyle poly acid and CTAB (cetyltrimethylammonium bromide) as templates. Different crystallization temperatures (120, 140, 160, and 180) 0C and calcinations temperatures (500, 550, 600, and 650) 0C were applied. All the batches were prepared at PH equals to 9. XRD diffraction technique and infrared Fourier transform spectroscopy were used to investigate the phase formation and the optical properties of the nano gamma alumina. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the particle size and the

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Nurse Scheduling Problem Using Hybrid Simulated Annealing Algorithm
...Show More Authors

Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Image Compression using Polynomial Coding Techniques: A review
...Show More Authors

Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation Liquid Permeability Using Air Permeability Laboratory Data
...Show More Authors

Permeability data has major importance work that should be handled in all reservoir simulation studies. The importance of permeability data increases in mature oil and gas fields due to its sensitivity for the requirements of some specific improved recoveries. However, the industry has a huge source of data of air permeability measurements against little number of liquid permeability values. This is due to the relatively high cost of special core analysis.
The current study suggests a correlation to convert air permeability data that are conventionally measured during laboratory core analysis into liquid permeability. This correlation introduces a feasible estimation in cases of data loose and poorly consolidated formations, or in cas

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Engineering Business Management
Using ANN in emergency reconstruction projects post disaster
...Show More Authors

The purpose of this study is to avoid delays and cost changes that occur in emergency reconstruction projects especially in post disaster circumstances. This study is aimed to identify the factors that affect the real construction period and the real cost of a project against the estimated period of construction and the estimated cost of the project. The case study is related to the construction projects in Iraq. Thirty projects in different areas of construction in Iraq were selected as a sample for this study. Project participants from the projects authorities provided data about the projects through a data collection distributed survey made by the authors. Mathematical data analysis was used to construct a model to predict change

... Show More
View Publication
Scopus (5)
Crossref (8)
Scopus Clarivate Crossref