Preferred Language
Articles
/
_4bxqIYBIXToZYALjaKh
Combination of the artificial neural network and advection-dispersion equation for modeling of methylene blue dye removal from aqueous solution using olive stones as reactive bed
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic and Isotherm Modeling of Adsorption of Dyes onto Sawdust
...Show More Authors

Sawdust has the ability to adsorb the dyestuff from aqueous solution. It may be useful low cost adsorbent for the treatment of effluents, discharged from textile industries. The effectiveness of sawdust has been tested for the removal of color from the wastewater samples containing two dyes namely Direct Blue (DB) and Vat Yellow (VY). Effect of various parameters such as agitation time, adsorbent dose and initial concentration of each dye has been investigated in the present study. The adsorption of dyes has been tested with various adsorption isotherm models. The Langmuir isotherms model is found to be the most suitable one for the dye adsorption using sawdust and the maximum adsorption capacity is 8.706 mg/g and 6.975 mg/g for DB and V

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Using Solid Waste as A Substitute for Raw Materials in Construction: A Review.
...Show More Authors

The main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative

... Show More
View Publication
Publication Date
Wed Jun 30 2021
Journal Name
Scientific Review Engineering And Environmental Sciences
Mesoscale modeling of fracture in cement and asphalt concrete
...Show More Authors

In this paper, mesoscale modeling is performed to simulate and understand fracture behavior of two concrete composites: cement and asphalt concrete using disk-shaped compact tension (DCT) tests. Mesoscale models are used as alternative to macroscale models to obtain better realistic behavior of composite and heterogeneous materials such as cement and asphalt concrete. In mesoscale models, aggregate and matrix are represented as distinct materials and each material has its characteristic properties. Disk-shaped compact tension test is used to obtain tensile strength and fracture energy of materials. This test can be used as a better alternative to other tests such as three points bending tests because it is more convenient for both field and

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 05 2023
Journal Name
Mathematical Theory And Modeling
(Tc) Technique for Finding Optimal Solution To Transportation Problem
...Show More Authors

Given the importance of increasing economic openness transport companies’ face various issues arising at present time, this required importing different types of goods with different means of transport. Therefore, these companies pay great attention to reducing total costs of transporting commodities by using numbers means of transport methods from their sources to the destinations. The majority of private companies do not acquire the knowledge of using operations research methods, especially transport models, through which the total costs can be reduced, resulting in the importance and need to solve such a problem. This research presents a proposed method for the sum of Total Costs (Tc) of rows and columns, in order to arrive at the init

... Show More
Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Journal Of Medicinal And Chemical Sciences
Organic Synthesis of Some New Compounds Derived from Furfural and Their Evaluation as Antioxidants
...Show More Authors

Heterogeneous organic compounds play an important role in our daily life as they contribute in many medical and industrial fields and are in continuous development as a result of the preparation of new derivatives with different properties. From this premise, the goal of this work appears, which is preparation of (four, five, six, and seven) membered ring systems derived from furfural, by its reaction with different aromatic aldehydes, and record their antioxidant activity by using free radical scavenging method of DPPH radicals. The new ring systems are synthesized by reacting the prepared Schiff-bases with different ring closure agents (chloroacetyl chloride, mercaptoaceticacid, anthranilic acid, and phthalic anhydride), the prep

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Crossref