Preferred Language
Articles
/
bsj-4504
Adsorption of Some Alephatic Dicarboxylic Acids on Zinc Oxide: A kinetic and Thermodynamic Study
...Show More Authors

The adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correlation coefficient, which indicates that the adsorption process follow the pseudo-second order kinetics. The negative values of Gibbs free energy and the enthalpy change confirm the spontaneous and exothermic nature of the adsorption process. A good ability of zinc oxide to remove aliphatic dicarboxylic acids from its aqueous solutions has been found, and the chain length of the acids has no significant effect on its adsorption.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Some Durability Test of No-Fine Concrete
...Show More Authors

In this study, two types of mixes were adopted by using two grading of coarse aggregate. The practical side of this study was to produce no-fine aggregate concrete by using crushed clay brick aggregates. The durability of the produced concrete and internal sulfate attack was studied.      For durability assessment, it is found that the no-fine concrete made with crushed brick aggregate lost about (15-25) % of its compressive strength after being subjected to 60 cycles of wetting and drying with age 120 days. The curing condition showed that the water curing improved the compressive strength with a rate higher than that when sealed or air dry curing were used. The crushed brick no-fine concrete de

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The Significance of the Folk Symbols and Their Influence on The National Identity (Chosen samples from the Contemporary Iraqi Pottery): زينب كاظم صالح
...Show More Authors

The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article The problem of nuclear proliferation and its impact on the formula of strategic balance in the Middle East after the events of September 11, 2001
...Show More Authors

The issue of nuclear proliferation is one of the most vital issues as it reflects a form of dealing in the field of international relations. Therefore, the Middle East region has taken great interest in reducing the levels of nuclear armament and acquiring nuclear power within the strategic framework of the international and regional powers. The establishment of a nuclear-weapon-free zone in the Middle East region is currently one of the most important international and regional arrangements for controlling the levels of nuclear proliferation and attempting to build a state of stability and balance. In the Middle East and the world. The importance of the research comes from the fact that it deals with an important and vital issue

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the impact of foreign direct investment in the Iraqi tax system using the factorial analysis: (principal components)
...Show More Authors

The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural  reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.

The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study  the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref