Preferred Language
Articles
/
S4bVRoYBIXToZYALV4Hn
Biomineralization based remediation of cadmium and nickel contaminated wastewater by ureolytic bacteria isolated from barn horses soil
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance of Subsurface Flow Constructed Wetland Systems in the Treatment of Al-Rustumia Municipal Wastewater using Continuous Loading Feed
...Show More Authors

This study aimed at comparing the performance of vertical, horizontal and hybrid subsurface flow systems in secondary treatment for the effluent wastewater from the primary basins at Al-Rustumia wastewater treatment plant, Baghdad, Iraq. The treatments were monitored for six weeks while the testsduration were from 4 to 12 September 2018 under continuous wastewater feeding for chemical oxygen demand (COD), total suspended solid (TSS),ammonia-nitrogen(NH4-N) and phosphate (PO4-P) in comparison with FAO and USEPA standards for effluent discharge to evaluate the suitability of treated water for irrigation purposes. Among the systems planted with Phragmites Australia, the hybrid subsurface flow system which cons

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Improving Voltage Stability in Kurdistan Power System in Areas with Deficit Power Production by Rescheduling the Active Power Based on PSS/E Simulation
...Show More Authors

This paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Apr 02 2025
Journal Name
Journal Of Electrochemical Science And Engineering
Improving the corrosion behaviour of Zn-Ni alloy coatings on 316 SS from chloride-sulfate bath by addition of triethanolamine or sucrose
...Show More Authors

Corrosion of Zn-Ni alloy coatings on stainless steel 316 SS in a chloride-sulfate bath with the addition of either triethanolamine or sucrose was examined. A constant cathode potential was used to deposit zinc-nickel alloys, while cyclic voltammetry and potentio-dynamic polarization were used to measure corrosion. In addition, scanning electron microscopy was utilized to analyse Zn-Ni alloy coating surface layers formed with¬out and with additives. The outcomes discovered that the corrosion resistance of Zn-Ni alloy coat¬ings in 3.5 % NaCl solution was highly influenced by adding triethanolamine or sucrose. Decreasing the Zn:Ni molar ratio led to an increase in corrosion resistance. All Zn-Ni alloy coatings were superior to pure Z

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Direct transplant of melanocytes from normal donor area into vitiligenous recipient area by intralesional injection of melanocytes using spade like needle technique
...Show More Authors

KE Sharquie, AA Noaimi, ZN Al-Khafaji…, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 2

View Publication
Publication Date
Fri Apr 01 2022
Journal Name
Separation And Purification Technology
Application of central composite design approach for optimisation of zinc removal from aqueous solution using a Flow-by fixed bed bioelectrochemical reactor
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Occurrence of Quinolone-Resistance Genes in Ciprofloxacin-Resistant Salmonella Enterica Serotype Typhi Isolated form Blood Sample of Patients with Typhoid Fever
...Show More Authors

 

Salmonella is approved as a common foodborne pathogen, causing major health problems throughout the world particularly in low‐ and middle‐income countries. Low-level fluoroquinolone resistance is conferred by both chromosomal and plasmid-encoded resistance, this research was carried out look into the occurrence rate of qnrA,qnrB and qnrS genes  in  Salmonella enterica serotype Typhi Cipr  ofloxacin-resistant insulate from blood samples of patients with typhoid fever. Fifteen Salmonella enterica serotype Typhi isolated previously from patients with typhoid fever were included in this study. All bacterial isolates were confirmed to have ciprofloxacin

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref