Preferred Language
Articles
/
RBcHdZABVTCNdQwCV4uz
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Dehydration of Ethanol Using Pervaporation Separation with Nanoporous Hydrophilic Silica Ceramic Membrane
...Show More Authors

The pervaporation using a commercial hydrophilic ceramic membrane supplied from PERVATECH was conducted. The dehydration of ethanol/ water system was used as a model for the pervaporation study. Pervaporation experiments of ethanol/water system were carried out in the temperature range of 303-343K, ethanol concentration in the feed 10-90 vol. % and the feed flow rate in the range of 0.5-10 L/min.  In this work, the effect of operation parameters on permeates fluxes as well as permeates separation factors have been studied. The Water flux is strongly dependent on the temperature; it increased with increasing in temperature, which in turn decreased the selectivity of membrane to water molecules.

In addition water flux was decr

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Medicine Advances
Quality of life, adherence and knowledge of epileptic patients and the impact of a pharmacist‐led educational intervention: A review
...Show More Authors

Around 65 million individuals suffer from epilepsy worldwide, and when it is not properly treated, it is linked to higher rates of physical harm and mortality. Due to the requirement for long‐term therapy and the side effects of many medications, medication compliance is a significant issue. The purpose of this review was to summarize the findings of previous studies examining the quality of life (QOL), adherence, patient education, and medication knowledge, as well as the impact of a pharmacist‐led educational intervention. Additionally, to find out if these studies benefit epileptic patients, to find the appropriate method used to help them in all aspects of their lives, and to use these in future studies. A systematic and comprehensi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Al-fatih Journal
The impact of the use of mirrors in the level of performance of some skills epeeEmpirical researchStudents on the third stage in the Faculty of Physical Education for Girls
...Show More Authors

يهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Environmental Nanotechnology, Monitoring & Management
A review study summarizes the main characterization techniques of nano-composite photocatalysts and their applications in photodegradation of organic pollutants
...Show More Authors

Scopus (57)
Crossref (18)
Scopus Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
The Effect of the Solution Heat Treatment on the Mechanical Properties of Aluminum-Copper Alloy (2024-T3) Using Rolling Process
...Show More Authors

The effect of solution heat treatment on the mechanical properties of Aluminum-Copper alloy. (2024-T3) by the rolling process is investigated. The solution heat treatment was implemented by heating the sheets to 480 C° and quenching them by water; then forming by rolling for many passes. And then natural aging is done for one month. Mechanical properties (tensile strength and hardness) are evaluated and the results are compared with the metal without treatment during the rolling process. ANSYS analysis is used to show the stresses distribution in the sheet during the rolling process.  It has been seen that good mechanical properties are evident in the alloy without heat treatment due to the strain hardening and also the mechanical

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref