Preferred Language
Articles
/
bsj-3233
Fabrication and Characterization of Gas Sensor from ZrO2: MgO Nanostructure Thin Films by R.F. Magnetron Sputtering Technique
...Show More Authors

Thin films ZrO2: MgO nanostructure have been synthesized by a radio frequency magnetron plasma sputtering technique at different ratios of MgO (0,6, 8 and  10)% percentage to be used as the gas sensor for nitrogen dioxide NO2. The samples were investigated by X-ray diffraction (XRD), atomic force microscopy (AFM), scanning electron microscopy (SEM), energy-dispersive X-ray (EDX) and sensing properties were also investigated. The average particle size of all prepared samples was found lower than 33.22nm and the structure was a monoclinic phase. The distribution of grain size was found lower than36.3 nm and uninformed particles on the surface. Finally, the data of sensing properties have been discussed, where they indicated that sensitivity reached 42.566% at 300 oC, spectral response time less than 52.2 s and recovery time 135.9 s.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Comparative Study of Organic and Mineral Acids in the Release of Potassium from Potassium Feldspar Minerals
...Show More Authors
Abstract<p>A study conducted a laboratory experiment to measure the release of potassium and the dissolution of feldspar minerals in soils from different locations in Karbala Province (Ain Al-tamur, Qasr Al-Akhyar, Fadak Farm). The study involved the addition of organic acids (fulvic and humic) and mineral acids (sulfuric and phosphoric) at concentrations of 5% and 10% to sand-separated soil samples obtained through wet sieving. Feldspar minerals were identified using a polarized light microscope, and the percentage of each type of feldspar mineral was calculated. The results demonstrated that organic acids outperformed mineral acids in releasing potassium at both concentrations. Among the organ</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Biochem. Cell. Arch.
Effect of essential oil extracted from the peels of Citrus paradisi and Citrus sinensis on some fungi
...Show More Authors

This study examined the effect of essential oils extracted from peel of Citrus paradisi and Citrus sinensis on two species of fungi: Penicillium oxalicum and Fusarium oxysporum as well as effect of two fungicides: Carbendazim and Thiophanatemethyl against above fungi. Results showed that the essential oil of Citrus paradisi inhibited the radial growth of Penicillium oxalicum and Fusarium oxysporum at concentration 4%. Nevertheless, the essential oil of Citrus sinensis inhibited the radial growth at concentration 5 and 4%, respectively. Furthermore, the two studied fungicides inhibited radial growth of these fungi too. Therefore, there are a positive relationship between the evaluating of concentration and the percentage of inhibiting of rad

... Show More
Scopus (3)
Scopus
Publication Date
Wed Feb 28 2018
Journal Name
International Journal Of Science And Research (ijsr)
Synthesis, Structure Determination and Biological Study of Some Complexes of New Ligand Derived from L-ascorbic Acid
...Show More Authors

2,2'-(1-(3,4-bis(carboxydichloromethoxy)-5-oxo-2,5-dihydrofuran-2-yl)ethane-1,2-diyl)bis(oxy)bis(2,2-dichloroacetic acid) a derivative of L-ascorbic acid was prepared by reaction of L-ascorbic acid with trichloroacetic acid (1:4) ratio, in the presence of potassium hydroxide. A series of new metal complexes of this ligand were prepared by a reaction with the chlorides of Cd(II), Co(II), Ni(II), Cu(II) and Zn(II). The new ligand and its complexes were identified by C.H.N., IR, UV-visible spectra, Thermogravimetric analysis (TGA), as well as 1H, 13C-NMR and Mass spectra for ligand L. The complexes were also identified by molar conductance, atomic absorption, magnetic susceptibility and X-ray diffraction for Cu (II) complex. FT-IR spectra

... Show More
Publication Date
Mon Jan 04 2021
Journal Name
Geofluids
Performance Evaluation of Polyethersulfone Membranes for Competitive Removal of Cd2+, Co2+, and Pb2+ Ions from Simulated Groundwater
...Show More Authors

This paper presents studying the performance of three types of polyethersulfone (PES) membrane for the simultaneous removal of Co2+ ions, Cd2+ ions, and Pb2+ ions from binary and ternary aqueous solutions. Co2+ ions, Cd2+ ions, and Pb2+ ions with two different initial concentrations (e.g., 10 and 50 ppm) were selected as examples of heavy metals that contaminate the groundwater as a result of geological and human activities. This study investigated the effect of types of PES membrane and metal ions concentration on the separation process. For the binary aqueous solutions, the permeation flux of the PES2 membranes was higher for the separation process of solutions containing 50 ppm of Cd2+ ions and 10 ppm of Co2+ ions (24.7 L

... Show More
View Publication
Scopus (23)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Microporous And Mesoporous Materials
Synthesis of hierarchically porous ZSM-5 zeolite by self-assembly induced by aging in the absence of seeding-assistance
...Show More Authors

View Publication
Scopus (54)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
تقدير دالة الأنحدار اللامعلمي باستخدام بعض الطرائق اللامعلمية الرتيبة
...Show More Authors

المستخلـص

تم في هذا البحث دراسة الطرائق اللامعلمية الرتيبة لتقدير دالة الأنحدار اللامعلمي، ومعالجة القيم الشاذة الموجودة في دالة الأنحدار اللامعلمي لجعل الدالة رتيبة (متزايدة أو متناقصة).

لذا سنقوم أولاً بتقدير دالة الأنحدار اللامعلمي بإستخدام ممهد Kernel ومن ثم تطبيق الطرائق الرتيبة لجعل الدالة متزايدة إذ سنتناول ثلاث طرائق للتقدير:-

1- طريقة ste

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref