Preferred Language
Articles
/
QBZcyIoBVTCNdQwCO6U3
Performance Evaluation of Polyethersulfone Membranes for Competitive Removal of Cd2+, Co2+, and Pb2+ Ions from Simulated Groundwater

This paper presents studying the performance of three types of polyethersulfone (PES) membrane for the simultaneous removal of Co2+ ions, Cd2+ ions, and Pb2+ ions from binary and ternary aqueous solutions. Co2+ ions, Cd2+ ions, and Pb2+ ions with two different initial concentrations (e.g., 10 and 50 ppm) were selected as examples of heavy metals that contaminate the groundwater as a result of geological and human activities. This study investigated the effect of types of PES membrane and metal ions concentration on the separation process. For the binary aqueous solutions, the permeation flux of the PES2 membranes was higher for the separation process of solutions containing 50 ppm of Cd2+ ions and 10 ppm of Co2+ ions (24.7 L/m2·h) and Pb2+ ions (23.7 L/m2·h). All the metals in the binary solutions had high rejection when their initial concentration was lower than the initial concentration of the other metal present in the same solution. Using PES2, the maximum rejection of Cd2+ ions was 61.3% when the initial concentrations were 50 ppm Pb2+ ions: 10 ppm Cd2+ ions and 55.4% for Pb2+ ions when the initial concentrations were 10 ppm Pb2+ ions: 50 ppm Cd2+ ions. For the ternary aqueous solutions, the rejection and the permeation flux of the PES membranes increased with decreasing the heavy metal initial concentration. Using PES2, the maximum permeation flux was 21.6 L/m2·h when the initial concentration of the metals was 10 ppm; and the maximum rejection of the metals obtained at initial concentration of 10 ppm was 50.5% for Co2+ ions, 48.3% for Cd2+ ions, and 40% for Pb2+ ions. The results of the filtration process using PES2 of simulated contaminated-groundwater indicated the efficient treatment of groundwater containing Co2+, Cd2+, and Pb2+ ions.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)

 

   The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units.

Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) an

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)

     The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units. Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) and global hydraulic elements (GHE

... Show More
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Crossref (13)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
Scopus (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
CART_based Approach for Discovering Emerging Patterns in Iraqi Biochemical Dataset

    This paper is intended to apply data mining techniques for real Iraqi biochemical dataset to discover hidden patterns within tests relationships. It is worth noting that preprocessing steps take remarkable efforts to handle this type of data, since it is pure data set with so many null values reaching a ratio of 94.8%, then it becomes 0% after achieving these steps. However, in order to apply Classification And Regression Tree (CART) algorithm, several tests were assumed as classes, because of the dataset was unlabeled. Which then enabled discovery of patterns of tests relationships, that consequently, extends its impact on patients’ health, since it will assist in determining test values by performing only relevant

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Robust Tests for the Correlation Coefficient: A Comparative Study

This paper is Interested with studying the performance of statistic test the hypothesis of independence of the two variables (the hypothesis that there is no correlation between the variables under study) in the case of data to meet the requirement of normal distribution in the case away from the distribution due to the presence of outliers (contaminated values) and compared with the performance of some of the other methods proposed and modified

View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Data Mining Methods for Extracting Rumors Using Social Analysis Tools

       Rumors are typically described as remarks whose true value is unknown. A rumor on social media has the potential to spread erroneous information to a large group of individuals. Those false facts will influence decision-making in a variety of societies. In online social media, where enormous amounts of information are simply distributed over a large network of sources with unverified authority, detecting rumors is critical. This research proposes that rumor detection be done using Natural Language Processing (NLP) tools as well as six distinct Machine Learning (ML) methods (Nave Bayes (NB), random forest (RF), K-nearest neighbor (KNN), Logistic Regression (LR), Stochastic Gradient Descent (SGD) and Decision Tree (

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Third Order Differential Subordination for Analytic Functions Involving Convolution Operator

       In the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.

Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
View Publication Preview PDF