Preferred Language
Articles
/
IRY8kIoBVTCNdQwCDaBK
Synthesis and characterization of alumina-grafted acrylic acid monomer and polymer and its adsorption of phenol and p-chlorophenol
...Show More Authors

Aluminum oxide (ALO) was grafted by acrylic acid monomer (AlO-AM) and then, it was polymerized to produce alumina grafted poly(acrylic acid) (AlO-AP). The prepared AlO-AM and AlO-AP were characterized by Fourier-transform infrared, differential scanning calorimetry , thermogravemetric analyzer and particle size distribution. Adsorption equilibrium isotherms, adsorption kinetics and thermodynamic studies of the batch adsorption process were used to examine the fundamental adsorption properties of phenol (P) and p-chlorophenol (PCP). The experimental equilibrium adsorption data were analyzed by three widely used two-parameters Langmuir, Freundlich and DubininRadushkevich isotherms. The maximum P and PCP adsorption capacities based on the Langmuir isotherm were calculated at 56.818, 78.741, 92.593, 80.002, 103.579 and 131.579 mg/g for P and PCP onto ALO, AlO-AM and AlO-AP, respectively. The experimental kinetic data were analyzed by using Pseudo-first order and pseudo-second order kinetic models. A comparison of the kinetic models on the overall adsorption rate showed that the adsorption system can be best described by the pseudo-second order kinetics. Based on the calculated thermodynamic parameters such as enthalpy (DH°), entropy (DS°) and Gibb’s free energy changes (DG°). The negative DG° and DH° values indicated that the adsorption of P and PCP by AlO-AM and AlO-AP adsorbent was feasible, spontaneous and the process was exothermic in nature.

Scopus
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding
...Show More Authors

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
How to Improve Workforce Development and Sustainability in Construction
...Show More Authors

View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Mar 10 2020
Journal Name
Journal Of Inverse And Ill-posed Problems
Direct and inverse source problems for degenerate parabolic equations
...Show More Authors
Abstract<p>Degenerate parabolic partial differential equations (PDEs) with vanishing or unbounded leading coefficient make the PDE non-uniformly parabolic, and new theories need to be developed in the context of practical applications of such rather unstudied mathematical models arising in porous media, population dynamics, financial mathematics, etc. With this new challenge in mind, this paper considers investigating newly formulated direct and inverse problems associated with non-uniform parabolic PDEs where the leading space- and time-dependent coefficient is allowed to vanish on a non-empty, but zero measure, kernel set. In the context of inverse analysis, we consider the linear but ill-pose</p> ... Show More
View Publication
Scopus (20)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Mar 20 2021
Journal Name
Agroforestry Systems
Hydraulic lift: processes, methods, and practical implications for society
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Computations for the groups SL(2,81) and SL(2,729)
...Show More Authors

For any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Oct 18 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment
...Show More Authors

Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM

... Show More
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Academy Of Accounting And Financial Studies Journal
Organizational performance in Iraqi SMEs: Validity and reliability questionnaire
...Show More Authors

View Publication
Scopus (7)
Scopus