Preferred Language
Articles
/
Vxefw48BVTCNdQwC-X3N
Use of Nano Co-Ni-Mn Composite and Aluminum for Removal of Artificial Anionic Dye Congo Red by Combined System
...Show More Authors

The removal of congo red (CR) is a critical issue in contemporary textile industry wastewater treatment. The current study introduces a combined electrochemical process of electrocoagulation (EC) and electro-oxidation (EO) to address the elimination of this dye. Moreover, it discusses the formation of a triple composite of Co, Mn, and Ni oxides by depositing fixed salt ratios (1:1:1) of these oxides in an electrolysis cell at a constant current density of 25 mA/cm2. The deposition ended within 3 hours at room temperature. X-ray diffractometer (XRD), field emission scanning electron microscopy (FESEM), atomic force microscopy (AFM), and energy dispersive X-ray (EDX) characterized the structural and surface morphology of the multi-oxide sediment. Marvelously, the deposition has simultaneously occurred on both anodic and cathodic graphite electrodes. These electrodes besides aluminum (Al) are employed as anodes in the EC-EO system, and the results were optimized by response surface methodology (RSM). The optimum operating conditions were a current density of 6 mA/cm2, pH = 7, and NaCl of 0.26 g/L. The results showed that the combined system eliminated more than 99.91% of the congo red dye with a removal of chemical oxygen demand (COD) of around 97% with 1.64 kWh/kg of dye of the consumed energy. At low current density, the current delivered for the composite anode was more than for the Al anode with the same surface area. On top of this superiority, the EC-EO scenario is a practical hybrid process to remove CR in an environmentally friendly pathway.

Scopus Crossref
View Publication
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Enhanced aerodynamics for sport cars using inverted wings: A comprehensive review
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
International Journal Of Advances In Intelligent Informatics
An automatic lip reading for short sentences using deep learning nets
...Show More Authors

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fixed Point for Asymptotically Non-Expansive Mappings in 2-Banach Space
...Show More Authors

  In  this  paper, we  introduced   some  fact  in   2-Banach  space. Also, we define  asymptotically  non-expansive  mappings  in  the  setting  of  2-normed  spaces analogous  to  asymptotically non-expansive mappings  in  usual  normed spaces. And then prove the existence of fixed points for this type of mappings in 2-Banach spaces.

View Publication Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Mar 22 2016
Journal Name
Brazilian Journal Of Physics
Alpha Decay Preformation Factors for Even–Even 280–316116 Superheavy Isotopes
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Russian foreign policy towards the Arab Gulf For the post-2001
...Show More Authors

The Russian foreign policy of the post-cold-war era faced dilemmas in the light of the international and regional realities of the disintegration of the Soviet Union and the formation of a new unipolar international order led by the United States of America. Thus, Russian foreign policy-making was divided over the nature of the foreign policy to be followed. The achievement of the Russian goals, especially as the objectives of Russian foreign policy have been set within the framework of trying to regain the status and leading role, as well as the establishment of some fundamental changes to be consistent with the new international situation of the post-one The Russian Federation has adopted in the sphere of its foreign policy to the vari

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 26 2019
Journal Name
Journal Of Contemporary Medical Sciences
Breast Cancer Decisive Parameters for Iraqi Women via Data Mining Techniques
...Show More Authors

Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using

... Show More
View Publication Preview PDF
Crossref (2)
Crossref