Preferred Language
Articles
/
FBc98pEBVTCNdQwCWZ2P
Treatment of Al-Muthanna Petroleum Refinery Wastewater by Electrocoagulation Using a Tubular batch Electrochemical Reactor
...Show More Authors
Abstract<p>An electrocoagulation process has been used to eliminate the chemical oxygen demand (COD) from wastewaters discharged from the Al-Muthanna petroleum refinery plant. In this process, a circular aluminum bar was used as a sacrificial anode, and hallow cylinder made from stainless steel was used as a cathode in a tubular batch electrochemical Reactor. Impacts of the operating factors like current density (5-25mAcm<sup>-2</sup>), NaCl addition at concentrations (0-2g/l), and pH at values (3-11) on the COD removal efficiency were studied.</p><p>Results revealed that the increase in current density increases the COD removal efficiency, whereas an increase in NaCl concentration results in a decline in the COD removal efficiency. Using a pH value higher or lower than 7 causes a lowering of the COD removal efficiency. A current density of 15mA/cm<sup>2</sup>, NaCl concentration of 1g/l, and pH value of 7 were found to be the best operating conditions in which COD removal efficiency of 95.3% was achieved at a treatment time 45 minutes with an energy consumption of 27.78kWh/kg COD. Based on these conditions, a COD value of 20 ppm could be obtained, which is below the standard limit for discharging petroleum refinery effluents.</p>
Scopus Crossref
View Publication
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy aggregate production planning by using fuzzy Goal programming with practical application
...Show More Authors

Research summarized in applying the model  of fuzzy goal programming for aggregate production planning , in General Company for hydraulic industries / plastic factory to get an optimal production plan  trying to cope with the impact that fluctuations in demand and  employs all available resources using two strategies where they are available   inventories  strategy and  the strategy of  change in the level of the workforce, these   strategies  costs are usually imprecise/fuzzy. The plant administration trying to minimize total production costs, minimize carrying costs and minimize changes in labour levels. depending on the gained data from th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
The approach of Al-Hafiz Ibn Al-Malqin, in his followings on the Nisaburi ruler, through the book Al-Badr Al-Munir in the graduation of hadiths of the great commentary
...Show More Authors

Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
   For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
   This research included important results, th

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Biotreatment of Actual Potato Chips Processing Wastewater with Electricity Generation in Microbial Fuel Cell
...Show More Authors

This study aimed to investigate the feasibility of treatment actual potato chips processing wastewater in a continuously operated dual chambers microbial fuel cell (MFC) inoculated with anaerobic sludge. The results demonstrated significant removal of COD and suspended solids of more than 99% associated with relatively high generation of current and power densities of 612.5 mW/m3 and 1750 mA/m3, respectively at 100 Ω external resistance.

 

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Narrative Structures in Abu AL– Hassan AL- Shushtary Poetry
...Show More Authors

The Al-Shishtary is considered one of the well-known Andalus poets. His poetry represents a flood of kind emotions, springs from the sincere sources of Divine Love, and this is what we felt in his life and his literary prestige. He was a poet who was familiar withthe art of his timeknowsthe oldand popularintellectual assets ofIslamicSciencesof Sharee'a. This wide culture, which he had, is available to him through his many travels between the coasts of Syria, Egypt and others ... to become Imam of the religion way known as(Al-Shishtariyah)resonatedin the hearts ofthe general publicespecially the poor people. This showshis smoothand influential styleand his humanitarian andsimple words which resonate in the hearts of his followers, therefo

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
The conversational imperative in Al Qiyam Al Fatimy speech
...Show More Authors

This study falls within the core of the deliberative theory, as this research seeks to highlight the concept of dialogical imputation that is present in all the discourses received by the recipient, and that this is not limited to dialogues, and that is why it is called (deliberative imperative). This is in agreement with the deliberative and functional approach that sees literary discourse as a dialogical and fulfilling necessity, due to its attachment to artistic connotations and submerged meanings in the saying. The allotted obligation and its impact on determining the purposes: The specific implication represented an important axis of pragmatic research, and a major concern in the work of discourse analysis. Because of its great importa

... Show More
View Publication
Scopus
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Al-arbaeen Al-boldniy for Ibin Asker Historical Study
...Show More Authors

Fortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Study of Forward Osmosis Using Various Drawing Agent
...Show More Authors

This research was aimed to study the osmotic efficiency of the draw solutions and the factors affecting the performance of forward osmosis process : The draw solutions used were magnesium sulfate hydrate (MgSO4.7H2O) pojtassium chloride (KCL), calcium chloride (CaCl2) and ammonium bicarbonate (NH4HCO3). It was found that water flux increases with increasing draw solution concentration, and feed solution flow rate and decreases with increasing draw solution flow rate and feed solution concentration. And also found that the efficiency of the draw solutions is in the following order:

CaCl2> KCI > NH4HCO3> MgSO4.7H

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref