Preferred Language
Articles
/
bsj-536
A study of adsorption isotherms for the removal of herbicide Atlantis WG from aqueous solutions by using Bentonite clay
...Show More Authors

The subject of this research involves studying adsorption to removal herbicide Atlantis WG from aqueous solutions by bentonite clay. The equilibrium concentration have been determined spectra photometry by using UV-Vis spectrophotometer. The experimental equilibrium sorption data were analyzed by two widely, Langmuir and Freundlish isotherm models. The Langmuir model gave a better fit than Freundlich model The adsorption amount of (Atlantis WG) increased when the temperature and pH decreased. The thermodynamic parameters like ?G, ?H, and ?S have been calculated from the effect of temperature on adsorption process, is exothermic. The kinetic of adsorption process was studied depending on Lagergren ,Morris ? Weber and Rauschenberg equations.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Sex Variations by Linear Measurements of Palatal Bones and Skull Base Using 3D Reconstructed Computed Tomographic Scan among Iraqi Sample
...Show More Authors

Background: The skull base and the hard palate contain many anatomical features that make them rich in information which are useful in sex differentiation; in addition to that they have the ability to resist the hardest environmental conditions that support them in making sex differentiation. Three dimensional computed tomographic techniques has important role in differentiation between sex since it offers images with very accurate data and details of all anatomical structures with high resolution. This study was made to study sex variations among Iraqi sample by craniometric linear measurements of the hard palate and the skull base using 3D reconstructed Computed Tomographic scan. Materials and methods: This study composed of 100 Iraqi su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Implementation of the Coronavirus Prevention Standards (Covid-19) In the Kingdom Of Saudi Arabia (A COMPARATIVE STUDY BETWEEN FAMILIES OF PEOPLE WITH INTELLECTUAL DISABILITIES AND FAMILIES OF ORDINARY PEOPLE)
...Show More Authors

The study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Gsc Biological And Pharmaceutical Sciences
Comparative anatomical study for fruits of some species of Bunium L. (Umbelliferae) in Iraq
...Show More Authors

Bunium is one of the interested genus that grow in different region of Iraq, it is within the family Umbelliferae (Apiaceae), and the species within this family have a considerable fruit characteristics. The species that were chosen in this study are: B. brachyactis (Post) H. Wolff, B. caroides (Boiss.) Hausskn. Ex Bornm., B. chaerophylloides (Regel& Schmalh.) Drude, B. rectangulum Boiss. & Hausskn., B. verruculosum C.C.Towns. and B. avromanum (Boiss.& Hausskn) Drude., the study found that the fruits of these species have 5 protrusions different in size but all have the same number of vittae, but some are semiler in size and some are not, the number of vascular element are varied between these species, anatomical charact

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Soft Computing And Computer Applications
Enhancing Image Classification Using a Convolutional Neural Network Model
...Show More Authors

In recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication