The oxidative degradation of Orange G dye by nanosized CeO2 catalyst has been performed in this study. The catalyst was prepared by precipitation method. Various characterization techniques were carried out to study the physical and chemical properties of the synthesized catalyst. The XRD result confirms well the formation of CeO2 cubic phase. The FTIR result showed the effect of calcination temperature for CeO2 was clearly observed due to reduction in band intensity compared to uncalcined Ce nitrate sample. Meanwhile, the diffused reflection spectra recorded reflection spectra at 414 nm with an energy gap of 3.2 ev. The decolorization of Orange G dye by oxidation process were carried out under various conditions such as, the effects of H2O2 dosage , pH, catalyst dosage and the temperature of reaction. The optimum conditions for the highest decolorization efficiency (100%) were achieved at 10 mg/L of orange G dye with catalyst dosage of 1.5 g/L, pH 2, reaction temperature of 65 °C and 0.1 mL H2O2.
The current study tackles how slavery and racial segregation, which have obviously made an enormous impact in the United States of America for many years, can be defeated through optimism. The study opens with an introduction that clarifies some background about Langston Hughes as a poet who writes against slavery and oppression done to the American Blacks during an era which was known for racial segregation in the United States of America. The poet sheds light , in his poetry, upon the role of African Americans in activating hope and optimism to get freedom which has been reached at the end. The first section of the study analyzes the meaning of slavery and segregation as reflected in some selected poems, showing the oppressive face of
... Show MorePurpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIn this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show More Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms. &am
... Show MoreKurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses
... Show More