Preferred Language
Articles
/
8hfF8pMBVTCNdQwCk-ux
Efficient Removal of Brilliant Green Dye Using Mesoporous Attapulgite Clay: Investigating Adsorption Kinetics, Isotherms, and Mechanisms
...Show More Authors

The study involved the effectiveness of Iraqi attapulgite (IQATP) clay as an environmentally friendly material that easily adsorbs brilliant green (BG) dye from water systems and is identified by various complementary methods (e.g., FTIR, SEM‐EDS, XRD, ICP‐OES, pHpzc, and BET), where the result reported that the IQATP specific surface area is 29.15 m2/g. A systematic analysis was selected to evaluate the impact of different effective adsorption performance variables on BG dye decontamination. These variables included IQATP dosage (0.02–0.8 g/L), solution pH (3.05–8.15), contact time (ranging from 2 to 25 min), and initial BG dye concentration from 20 to 80 mg/L. The parameters of kinetic profiles were best represented by the (P‐2‐O) model with the determination of coefficient (R2, 0.99), and the corresponding equilibrium data of dye provided a good fit of the Freundlich adsorption model with a maximal multilayer IQATP adsorption capacity (Qmax, = 1.41 mg/g) under optimum conditions (temperature 318 K, pH 3.05, optimum equilibrium time 25 min, and IQATP dosage 0.2 g/L) for BG dye removal. Thermodynamic parameters, including ΔG = −5.67, −6.10, and −7.56 kJ/mol, ΔH = 29.89 kJ/mol, ΔS = 118.73 J/mol·K, and activation energy Ea = 14.38 kJ/mol, were calculated to understand the adsorption process. This trend indicates an endothermic, spontaneous, and favorable adsorption profile for basic dye by IQATP. The adsorption mechanism was elucidated, indicating the involvement of electrostatic attractions, hydrogen bonding, and n − π interactions in the adsorption of cationic dye. Desorption experiments of BG by IQATP with five repetition cycles showed a great desorption percentage when using 0.1 M hydrochloric acid (HCl), as the eluting agent. Overall, the findings highlight IQATP as a promising and desirable natural adsorbent for the efficient removal of cationic dyes.

Crossref
View Publication
Publication Date
Mon May 14 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detection and Detoxification of Aflatoxin B1 from Fish Feedstuff Using Microwave and Ozone Gas
...Show More Authors

    The current study was designed to investigate the occurrence of aflatoxin B1 in thirty two samples of fish feedstuff were collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin B1 was detected in thirty samples and the concentration of toxin ranged from 50 ppb to 1000 ppb.  

   Microwave and ozone were used for detoxification of aflatoxin B1 from sample with highest concentration (1000 ppb), two degree of temperature and two times (50°C and 100°C for 5 minute and 10 minute to each degree) of microwave, also two doses and two times (2 g and 4 g for 5 minute and 10 minute to each dose) of ozone gas were used.

   Degradation of aflatoxin B1 by

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Intelligent Task Scheduling Using Bat and Harmony Optimization
...Show More Authors

     Cloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the  virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Directive and Steerable Radiation Pattern using SASPA Array
...Show More Authors

This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Iraqi Sentiment and Emotion Analysis Using Deep Learning
...Show More Authors

Analyzing sentiment and emotions in Arabic texts on social networking sites has gained wide interest from researchers. It has been an active research topic in recent years due to its importance in analyzing reviewers' opinions. The Iraqi dialect is one of the Arabic dialects used in social networking sites, characterized by its complexity and, therefore, the difficulty of analyzing sentiment. This work presents a hybrid deep learning model consisting of a Convolution Neural Network (CNN) and the Gated Recurrent Units (GRU) to analyze sentiment and emotions in Iraqi texts. Three Iraqi datasets (Iraqi Arab Emotions Data Set (IAEDS), Annotated Corpus of Mesopotamian-Iraqi Dialect (ACMID), and Iraqi Arabic Dataset (IAD)) col

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 06 2021
Journal Name
Iraqi Journal Of Science
3D Building Reconstruction Using DEM and Mosaic Model
...Show More Authors

A digital elevation model (DEM) is a digital representation of ground surface
topography or terrain. It can be represented as a raster (a grid of squares) and it is
commonly estimated by utilizing remote sensing techniques, or from land surveying.
In this research a 3D building of Baghdad university campus have been performed
using DEM, where the easting, northing, and elevation of 400 locations have been
obtained by field survey using global positioning system (GPS). The image of the
investigated area has been extracted from QuickBird satellite sensor (with spatial
resolution of 0.6 m). This image has been geo-referenced by selecting ground
control points of the GPS. The rectification is running, using 1st order

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Image Encryption Using DNA Encoding and RC4 Algorithm
...Show More Authors

Nowadays, the rapid development of multi-media technology and digital images transmission by the Internet leads the digital images to be exposed to several attacks in the transmission process. Therefore, protection of digital images become increasingly important.

 To this end, an image encryption method that adopts Rivest Cipher (RC4) and Deoxyribonucleic Acid (DNA) encoding to increase the secrecy and randomness of the image without affecting its quality is proposed. The Means Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Coefficient Correlation (CC) and histogram analysis are used as an evaluation metrics to evaluate the performance of the proposed method. The results indicate that the proposed method is secure ag

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
Lightweight Image Compression Using Polynomial and Transform Coding
...Show More Authors

Publication Date
Fri Jul 28 2017
Journal Name
Iraqi Journal Of Science
3D Building Reconstruction Using DEM and Mosaic Model
...Show More Authors

A digital elevation model (DEM) is a digital representation of ground surface topography or terrain. It can be represented as a raster (a grid of squares) and it is commonly estimated by utilizing remote sensing techniques, or from land surveying. In this research a 3D building of Baghdad university campus have been performed using DEM, where the easting, northing, and elevation of 400 locations have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from QuickBird satellite sensor (with spatial resolution of 0.6 m). This image has been geo-referenced by selecting ground control points of the GPS. The rectification is running, using 1st order polynomial transformation.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors