Preferred Language
Articles
/
HBZnUYkBVTCNdQwC54mE
Extraction of cobalt(II) from aqueous solution by N,N′-carbonyl difatty amides

The development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II). Co(II) stripping from the loaded organic phase was studied in aqueous solution. These results are useful to recover Co(II) from aqueous solution utilising (CDFAs) as an extractant.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
The Act Of An Operator

In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.

Crossref
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Dewatering of Kerosene using Hydrocyclone

Water/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Craniofacial Surgery
Patterns of Pediatric Maxillofacial Injuries

Facial trauma in children and adolescents is reported to range from 1% to 30%. Because of many anatomical, physiological, and psychological characteristics of the pediatric population, maxillofacial injuries in children should be treated with special consideration that is attributable to certain features inherent in facial growth patterns of children. This study evaluated maxillofacial injuries in 726 children in terms of incidence, patterns of injury, causes, and treatment modalities and compared these parameters among 3 pediatric age groups. Intergroup differences were analyzed using Z test for 2 populations' proportion. The results showed that the incidence of pediatric maxillofacial injuries and fractures is higher than that reported el

... Show More
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Self-Regulation of University Students

The current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Sponsorship of widows in Islam

The research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Legal Sciences
Legal Protection of Computer Programs

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties,

Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application.

This study comes to shed light on the legal na

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Diagnoses System of Varicose Disease

The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation of Wiped Film Evaporator

A mathematical model and associated computer program were developed to simulate the steady state operation of wiped film evaporators for the concentration of glycerol-water solution. In this model, various assumptions were made to facilitate the mathematical model of the wiped film evaporator. The fundamental phenomena described were: sensible heating of the solution and vaporization of water. Physical property data were coded into the computer program, which performs the calculations of this model. Randomly selected experiments were carried out in a small scale wiped film evaporator from ALVAL COMPANY, using different concentrations of the glycerol solution (10, 30 and 50 Wt. %) for different feed rates (30, 50, 80, 100 and 120 l/h) and

... Show More
View Publication Preview PDF