Preferred Language
Articles
/
AYbZPIYBIXToZYAL84Dt
Mathematical Modelling of Zinc Removal from Wastewater by Using Nanofiltration and Reverse Osmosis Membranes
...Show More Authors

The present work aimed to study the efficiency of nanofiltration (NF) and reverse osmosis (RO) process for treatment of heavy metals wastewater contains zinc. In this research, the salt of heavy metals were zinc chloride (ZnCl2) used as feed solution.Nanofiltration and reverse osmosis membranes are made from polyamide as spiral wound module. The parameters studied were: operating time (0 – 70 min), feed concentrations for zinc ions (10 – 300 mg/l), operating pressure (1 – 4 bar).The theoretical results showed, flux of water through membrane decline from 19 to 10.85 LMH with time. Flux decrease from 25.84 to 10.88 LMH with the increment of feed concentration. The raise of pressure, the flux increase for NF and RO membranes.The maximum recovery was 99% and 57% for NF and RO respectively.In general, polyamide nanofiltration and reverse osmosis membranes give a high efficiency for removal of zinc. The separation efficiency of heavy metals in reverse osmosis membrane higher than nanofiltration membrane. While the water flux in NF process higher than RO process. The water flux theoretically calculated is a function of pressure, feed temperature, feed concentration, feed flow rate and time.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DESCRIPTION OF THE PREDATOR BUSH CRICKET, SAGA EPHIPPIGERA FISCHER VON WALDHEIM, 1846 (ORTHOPTERA, TETTIGONIIDAE) FROM ERBIL PROVINCE, KURDISTAN REGION- IRAQ
...Show More Authors

The predatory bush crickets Saga ephippigera Fischer Von Waldheim, 1846 is the largest Iraqi orthopterans and one of the most active and successful predators in the Kurdistan region. The nymphs and adults prey on all the stages of various species of insects. Twelve adult specimens were collected from Erbil Province during May 2018 and June 2021. Morphological structures of the adult insects were described and illustrated in details; important taxonomic characteristics of body regions with their appendages were chosen; and the results indicated the importance of morphological characteristics which confirmed the identification of this species correctly.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect Different Radioactive Dose on Mechanical Properties of Composite Material from Novolak Resin Exposure to High – Energy Radiation
...Show More Authors

The research involves using phenol – formaldehyde (Novolak) resin as matrix for making composite material, while glass fiber type (E) was used as reinforcing materials. The specimen of the composite material is reinforced with (60%) ratio of glass fiber.

      The impregnation method is used in test sample preparation, using molding by pressure presses.

      All samples were exposure to (Co60) gamma rays of an average energy (2.5)Mev. The total doses were (208, 312 and 728) KGy.

      The mechanical tests (bending, bending strength, shear force, impact strength and surface indentation) were performed on un irradiated and irrad

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 02 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
New Record of the Species Synthesiomyia Nudiseta (van der Wulp, 1883) (Diptera, Muscidae) with Forensic Study from Kerbala City, Iraq
...Show More Authors

Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
...Show More Authors

From the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim

View Publication Preview PDF
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of Educational And Psychological Researches
The Factorial Structure of The Emotional Intelligence Scale to Bar-On Applied on Students from Preparatory School in Baghdad City.
...Show More Authors

The aim of the study was to know the factors analysis of scale Bar-On & Parker, post analysis is found fourteen factors for the first degree of the scale. Also we extracted five factors from the second degree.

  The scale consists of (60) items , applied on sample of (200) students (Male &Female ) age (15-18) years randomly chosen from preparatory schools . The scale unveiled satis factors  validity and reliability. An others aims is to low the  emotional  Intelligence level and  know the difference of statistical in sex , age variable and the specialization variable .The result was no difference of statistical in sex and specialization variable , but the difference appear

... Show More
View Publication Preview PDF
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Application of banking institutions' governance variables and their impact on financial performance as measured by (ROA & ROE): an applied study on a sample of local Islamic banks listed on the Iraq Stock Exchange
...Show More Authors

The research seeks to achieve its goal of demonstrating the impact of applying banking governance variables on the financial performance of Islamic banks, and the independent research variables are represented by (X) by (the number of independent members in the board (X1), the number of directors in the board (X2), the number of committees emanating from the board ( X3), the percentage of shares owned by major shareholders in the board (X4), the number of members of the Sharia supervisory board (X5)), and the dependent variable (Y) is represented by (rate of return on assets (Y1), rate of return on equity (Y2)).

The research sample included (4) Islamic banks, namely (Iraqi Islamic Bank, National Islamic Bank, Jihan Islamic Bank,

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Geochemical Exploration
Geochemical exploration using surveys of spring water, hydrocarbon and gas seepage, and geobotany for determining the surface extension of Abu-Jir Fault Zone in Iraq: A new way for determining geometrical shapes of computational simulation models
...Show More Authors

View Publication
Crossref (35)
Crossref
Publication Date
Wed Jul 31 2019
Journal Name
Journal Of Engineering
Buckling Analysis of Laminated Composite Plate with Different Boundary Conditions using modified Fourier series
...Show More Authors

Buckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology & Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref