In this paper the process of metal ions extraction (Zn(II) and Cu(II)) was studied in PEG-KCl aqueous two phase system was investigated without using an extracting agent. The experimental runs were performance at constant temperature (25 oC), constant mixing time (30 min), and constant PH of the solution (about 3). The effect of KCl salt concentration (from 10% to 25%), volumetric phase ratio of PEG solution to KCl solution (from 0.5 to 2), and the initial metal ion concentration (from 0.25 ml to 2 ml of 1 gm/L solution) were investigated on the percent extraction of Zn(II) and Cu(II). The results indicated that the percent extraction of metal ions increase with increasing of salt concentration and phase ratio, and slightly decrease with increasing of initial metal ion concentration.
The UN organization is considered one of the most important organizations at the international level. It has accomplished multiple tasks and roles of many different issues and events that hit the developing and advanced world countries. It has performed a series of procedures and laws that have had an impact on ending the wars and conflicts that plagued some countries and continued for a period of time in the past. Moreover, it has improved the level of the international relations between a number of countries due to the problems and incidents took place between them. It has relied on finding solutions and treatments for humanitarian problems such as the preservation of the environment, preventing the spread of epidemics and diseases Thi
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show MoreAbstract:
Purpose\The researcher paper aims to determine the impact of information technology on the job performance, for Iraq private ban as through the use of technology dimensions of job performance.
The aim of this research: this study aims to discuss the importance of information technology and its role in achieving job performance and its impact on the Iraq banking sector design/ methodology/ approach used entrance design/methodology/approach- pilot, the questionnaire was used to collect data in order to develop a model to measure reliably and correctly to the variables of information technology and job performance, and hypotheses were tested through the use of some statisti
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreAccurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show More