Preferred Language
Articles
/
bsj-7066
Kinetic and Theoretical Study of Removal Gentian Violet from Aqueous Solution Using Stachy Plant
...Show More Authors

     The main parameters and methods influencing the removal of Gentian Violet (GV) dye from aqueous media were investigated using a stachy plant in this study. The surface of the stachy plant was determined using FTIR spectra. Adsorption is influenced by the adsorbent's characteristic groups. The research took into account the usual conditions for GV dye adsorption by the stachy plant, such as the impact of contact time. Mass dosage , after 0.3 g the amount of adsorbed dye declines. Study pH and ionic strength, the results obtained showed that at pH 3 the largest adsorption of (GV) was seen, while at pH 9, the lowest adsorption was observed  at 298 K, the adsorption kinetics and equilibrium constants were achieved, and the equilibrium data was fitted using the Langmuir, Freundlich, and Temkin models. The pseudo-first-order and pseudo-second-order kinetic models were used to investigate the adsorption process of gentian violet. The adsorption kinetics was discovered to be governed by a pseudo-second-order kinetic model with a determination coefficient (R2) of 0. 0.9943. Study the theoretical electrostatics of Gentian Violet dye was measured and plotted as a 2D and 3D contour and the program hyperchem-8.07 was used for semi-empirical and molecular mechanic calculations in the gas phase to estimate the total energy.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
النص القرآني في فكر توشيهيكو إيزوتسو (Toshihiko Izutsu) دراسة من خلال كتابه (الله والإنسان في القرآن)
...Show More Authors

The researcher wanted in this research to shed light on one of the epistemological readings of the Quranic text, which is the reading of the Arabized Japanese researcher (Toshihiko Izutsu) in his book (God and Man in the Qur’an) and to explain what he has and what is on it.        

The summary of the facts in which he came out is that the knowledge reading of Toshihiko towards the Qur’anic text is old in concept. The oldest people have dealt with it in their works and what their pens have learned about, except that they have eaten and studied them under many headings such as: proportionality, consistency, systems and the like in terms, and the researcher has sought thro

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
تحليل حسابات الاعتمادات المستندية دراسة نظرية – تطبيقية في مصرف الرشيد – بغداد للفترة من 2004 – 2006 المالية
...Show More Authors

تلعب الاعتمادات المستندية دوراً كبيراً وخطيراً في التجارة الدولية باعتبارها إحدى أوسع أدوات الدفع انتشاراً في العالم سواءاً كان ذلك بالنسبة للمستورد أم للمصدر وتغطيتها للمخاطر المحتملة لكلا الطرفين، فهي تؤمن للمصدر استلام قيمة البضاعة بالكامل عند تنفيذها لشروط العقد، ويسمح للمستورد بعدم الدفع إلا بعد إتمام شحن البضاعة وتقديم المستندات المطلوبة واستلامها.

وتقوم المصارف التجارية المحل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
الإستراتيجية: المفهوم وإشكالية المصطلح دراسة تحليلية مقارنة لأراء عينة من الأكاديميين والمديرين في المملكة الأردنية الهاشمية
...Show More Authors

المُستلخص:

      يتناول هذا البحث موضوعاً يتركز في جانب تحديد مفهوم ومحتوى الإستراتيجية. وقد أشارت الأدبيات إلى عدد من المحاولات التي هدفت إلى تلمس مفهوم ومحتوى الإستراتيجية في منظمات الأعمال، غير أن تلك المحاولات- على الرغم من ندرتها- كانت تتسم بغلبة الأطر النظرية والتعبير عن المفهوم، بالإستناد إلى حوارات فكرية وإرهاصات ذات علاقة بمفهوم ومحتوى الإستراتيجية.

&

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology &amp; Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

View Publication
Crossref (21)
Crossref