Preferred Language
Articles
/
Cxc78pEBVTCNdQwCXp2K
Performance Evaluation of a Combined Electrocoagulation– Electrooxidation Process for the Treatment of Petroleum Refinery Wastewater
...Show More Authors
Abstract<p>The present study investigates the application of a combined electrocoagulation-electrooxidation (EC-EO) process for the treatment of wastewater generated from Al-Dewaniya petroleum refinery plant in Iraq. The EC-EO process was examined in terms of its ability to simultaneously produce coagulant and oxidant agents by using a parallel plate configuration system composed of stainless steel plates as cathode and pair of aluminum and graphite plates as anode at two different current concentrations (1.92A/l and 0.96A/l). The results showed that the best conditions for treatment of Al-Dewaniya petroleum refinery wastewater using the combined approach were current concentration of (0.96A/l), current density of (12mA/cm<sup>2</sup>), NaCl concentration of (2g/l), pH of (7), and electrolysis time of (60 min). In this case COD removal efficiency (93.75%), phenol removal efficiency (96.20%), TDS removal efficiency (6.88%) were obtained with lower specific energy consumption (29.45 kWh/kg COD) and lower aluminum consumption (0.587 x10<sup>−3</sup>kg/h). The combined process showed to be better than EC process in term of COD and phenol removal efficiencies as well as aluminium consumption. In addition, it was better than EO in term of energy consumption. The combined process also gave buffering effect regarding to pH hence no need for controlling the pH during the operation.</p>
Crossref
View Publication
Publication Date
Tue Jun 08 2021
Journal Name
Biomolecules
A Pan-Inhibitor for Protein Arginine Methyltransferase Family Enzymes
...Show More Authors

Protein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w

... Show More
View Publication
Scopus (22)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Feb 09 2024
Journal Name
Pharmacia
Evaluation of types and concentration of bile salts impact on physical properties of nisoldipine-loaded bilosomes
...Show More Authors

Background: Bilosomes are lipid vesicles that exhibit flexibility and deformability. They consist of phospholipids and amphiphilic bile salts. Compared to the normal vesicular systems such as liposomes and niosomes, bilosomes provide several notable advantages, including simplified manufacturing, cost-effectiveness, and enhanced stability.

Aim: The main objective of the present work was to evaluate the effect of different bile salts on the physical properties that include entrapment efficiency, vesicle size, and polydispersity index(PDI). In addition, in vitro drug release for nisoldipine (NSD) loaded bilosomes was evaluated.

... Show More
View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effectiveness of the organization and its role in achieving the requirements of Strategic success: A survey study of the opinions of a sample of workers at the Asia Telecom Company in Baghdad
...Show More Authors

The research aims present to highlight the importance of creating construction Organizational appropriate to achieve strategic success and reduce many of the negative effects experienced by organizations has been developing his questionnaire especially so was distributed to a sample of workers in the Asia-cellular as sample included (60) responsive 0 and can embody intellectual dilemma following questions (What are the dimensions of the organizational infrastructure, and what are the justifications for carrying out the reform and development cleared the organizational structure to make it more flexible) to contribute to the achievement of the strategic requirements for success of the organization surveyed.
Find recommended a number o

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
a study of the womens collages in usa
...Show More Authors

The study aims to identify the colleges women in the USA where he was browsing the Internet for five universities and sixty-two women's college located these colleges in 25 states only three general and other civil 51% supported by the churches and religious associations of various began its founding in Alqrnn eighteenth and continued in the nineteenth and twentieth and to provide an opportunity for women to complete higher education, while most men's colleges opened their doors to the admission of women and turned it on coeducation

View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior

... Show More
View Publication Preview PDF
Crossref