Preferred Language
Articles
/
bsj-2613
Adsorption of Hydrogen Sulphide on the Zeolite type A Synthezied from Iraqi Kaoline
...Show More Authors

Three types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Frendlich and Toth isotherm equations model were applied for the adsorption data in order to determine the affinity and the heterogeneity of the three adsorbents. The heterogeneity parameters of the model equation applied indicated that 5A sample was more heterogeneous compared to other zeolite types.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
F1000research
Association between polymorphisms within the gene coding for tumor necrosis factor (TNF)-alpha with outcomes of treatment in a sample of Iraqi patients with ankylosing spondylitis taking etanercept: an observational study
...Show More Authors

Background:Ankylosing spondylitis (AS) is a progressive, chronic inflammatory illness with an unclear etiology that explicitly targets the vertebral column, peripheral joints, and extraarticular tissues. The purpose of this research was to investigate if the existence of single nucleotide polymorphisms (SNPs) in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at positions -1031T/C (rs199964), -857C/T (rs1799724) and -806C/T (rs4248158) in a sample of Iraqi AS patients could influence the patients' outcomes with etanercept.

Methods:Sixty patients with established AS receiving only etanercept were selected to enroll in this study, with a mean age of 40.75±8.6

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref