Preferred Language
Articles
/
alkej-27
Kinetic and Mechanism of Oxidation of Oxalic Acid by Cerium (IV)
...Show More Authors

Kinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Equilibrium, Kinetic and Thermodynamic Study of Aniline Adsorption over Prepared ZSM-5 Zeolite
...Show More Authors

Aniline and its derivatives are common contaminants in various wastewaters and represent a serious worry for societies health and a challenge to ecologists due to their dangers effects on to the human health.

ZSM-5 zeolite was prepared from locally available materials (kaolin and rice husk) for adsorption of aniline from synthetic wastewater. Characterization of the prepared zsm-5, kinetics and thermodynamic of the adsorption process were investigated.

The characterization results of the prepared zsm-5 zeolite showed that the surface area was 270.1 m2/g and pore volume 0.21828 cm3/g. The silica to alumina ratio (Si/Al) was 166. 47 and the sodium content was 11 wt. %. The atomic force microscope (AFM)

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
2nd International Conference On Materials Engineering & Science (iconmeas 2019)
A kinetic model for prodigiosin production by Serratia marcescens as a bio-colorant in bioreactor
...Show More Authors

View Publication
Scopus (15)
Crossref (14)
Scopus Crossref
Publication Date
Mon Jul 09 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION: ESTIMATION OF WATER POLLUTION AND CULTIVATED PLANTS ON THE DIYALA RIVER WITH HEAVY ELEMENTS DURING THE SUMMER BY FLAME ATOMIC ABSORPTION
...Show More Authors

This study was carried out to measure the percentage of heavy metals pollution in the water of the Diyala river and to measure the percentage of contamination of these elements in the leafy vegetables grown on both sides of the Diyala river, which are irrigated by the contaminated river water (celery, radish, lepidium, green onions, beta vulgaris subsp, and malva). Laboratory analysis was achieved to measure the ratio of heavy element contamination (Pb, Fe, Ni, Cd, Zn and Cr) using flame atomic absorption spectrophotometer during the summer months of July and August for the year 2017. The study showed that the elements of zinc, chromium, nickel and cadmium were high concentrations and exceeded. The maximum concentration of these

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Decolorization of Phenol Red Dye by Immobilized Laccase in Chitosan Beads Using Laccase - Mediator - System Model
...Show More Authors

This work describes the enhancement of phenol red decolorization through immobilizing of laccase in chitosan and enzyme recycling. Commercial laccase from white rot fungus, Trametesversicolor (Tvlac), was immobilizedin to freshly prepared chitosan beads by using glutaraldehyde as a cross linker. Characterization of prepared chitosan was confirmed by FTIR and scanning electron microscope (SEM). Tvlac (46.2 U/mL) immobilized into chitosan beads at 0.8 % glutaraldehyde (v/v) within 24 hrs. Synthetic (HBT) and natural (vanillin) mediators were used to enhance dye decolorizoation. It was found that 89 % of phenol red was decolorized by chitosan beads within 180 min. in the absence of enzyme and mediator, while decolorization percenta

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Quantitative Determination of Fluoroquinolones in Contaminated Soils by HPLC with Solid-Phase Extraction
...Show More Authors

This work reports the development of an analytical method for the simultaneous analysis of three fluoroquinolones; ciprofloxacin (CIP), norfloxacin (NOR) and ofloxacin (OFL) in soil matrix. The proposed method was performed by using microwave-assisted extraction (MAE), solid-phase extraction (SPE) for samples purification, and finally the pre-concentrated samples were analyzed by HPLC detector. In this study, various organic solvents were tested to extract the test compounds, and the extraction performance was evaluated by testing various parameters including extraction solvent, solvent volume, extraction time, temperature and number of the extraction cycles. The current method showed a good linearity over the concentration ranging from

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Study of Seed Soaking and Foliar Application of Ascorbic Acid, Citric Acid and Humic Acid on Growth, Yield and Active Components In Maize
...Show More Authors

Foliar application and seed soaking has been used as a means of supplying supplemental doses of nutrients, plant hormones, stimulants, and organic components. the effects of these applications have included yield increases, and improved drought tolerance, and enhanced crop quality, so A field experiment was carried out during spring seasons in 2019 and 2020 for styding Seed soaking and Foliar Application of Ascorbic acid, Citric acid and Humic acid on Growth, Yield and Active Components IN Maize. Randomized complete block design in split plots arrangement was used with three replicates. Main-plots were for seeds soaking with ascorbic, citric (100 mg l-1) frequently and humic at (1 ml l-1). Sub-plots were for vegetative parts nutrition with

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Biores Scientica
Type IV Flexor Digitorum Profundus Avulsion: A Case Report
...Show More Authors

Abstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly

... Show More
Publication Date
Thu Aug 02 2018
Journal Name
Indian Journal Of Agricultural Research
Anatomical and physiological traits of broad bean (Vicia faba L.) seedling affected by salicylic acid and salt stress
...Show More Authors

A laboratory experiment was carried out at the College of Agriculture University of Baghdad in 2017. The aim was to improve the anatomical and physiological traits of broad bean seedling under salt stress by soaking it in salicylic acid. The concentrations of salicylic acid were 0, 10, and 20 mg L-1 and the electrical conductivity levels were 0, 3, and 6 dS m-1. The complete randomized design was used with four replications. The increasing of salicylic acid concentration up to 10 mg L-1 led to increasing the stem cortex thickness, stem vascular bundles thickness, and root cortex thickness significantly by (34.9,36.7,and 55 µm) respectively, while the treatment of 20 mg L-1 led to decreasing these traits by (28.2, 27.8, and 48.1 µm

... Show More
View Publication
Scopus (14)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF