Preferred Language
Articles
/
LEITzpoBMeyNPGM3fdRY
Studying the Photodegradation of Congo Red Dye from Aqueous Solutions Using Bimetallic Au–Pd/TiO2 Photocatalyst
...Show More Authors

In this study, the photodegradation of Congo red dye (CR) in aqueous solution was investigated using Au-Pd/TiO2 as photocatalyst. The concentration of dye, dosage of photocatalyst, amount of H2O2, pH of the medium and temperature were examined to find the optimum values of these parameters. It has been found that 28 ppm was the best dye concentration. The optimum amount of photocatalyst was 0.09 g/75 mL of dye solution when the degradation percent was ~ 96 % after irradiation time of 12 hours, while the best amount of hydrogen peroxide was 7μl/75 mL of dye solution at degradation percent ~97 % after irradiation time of 10 hours, whereas pH 5 was the best value to carry out the reaction at the highest degradation percent. In addition, temperature tested at range of (25-55) C˚, and it has been figured out which photodegradation percent of dye increase with raising temperature (degradation percent was ~ 98% after irradiation time of 4 hours at 55 C˚), and the activation energy of the reaction was calculated (34.8016 kJ/mole) from Arrhenius law. The thermodynamic functions ΔH#, ΔG#, and ΔS# were obtained, where ΔH# and ΔG# are positive value which means that the reaction is endothermic and non-spontaneous respectively, while ΔS# has a negative value, thus indicates that the reactants are more disordered than the excited intermediate formed. The kinetic of the reaction was studied, and it has been found that the photocatalytic reaction follows pseudo first order reaction.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jun 29 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Measuring Dyes Concentration Using a Low-Cost Visible-Light Spectrophotometer
...Show More Authors

   A low-cost, RGB LED-based visible-light spectrophotometer was designed to measure dyes concentration. Dyes are widely used as indicators or coloring agents in different applications and knowing their concentration is an essential part for many studies. The proposed spectrophotometer provides many functionalities that clones the traditional expensive spectrophotometers for a budged price under $50. It was aimed to provide a versatile tool for instructors and educators to teach their students the fundamental concepts behind spectrophotometry. Malachite green, methyl red, and methyl orange dyes were chosen to be good samples to show the integrity of the proposed spectrophotometer in terms of accuracy, repeatability, and sensitivity as

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Using modified earned value for cost control in construction projects
...Show More Authors

Scopus (17)
Scopus
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Using Machine Learning to Control Congestion in SDN: A Review
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Object tracking using motion flow projection for pan-tilt configuration
...Show More Authors

We propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated

... Show More
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref