Preferred Language
Articles
/
eoZ0QYYBIXToZYALvICJ
Removal of Manganese Ions (Mn2+) from a Simulated Wastewater by Electrocoagulation/ Electroflotation Technologies with Stainless Steel Mesh Electrodes: Process Optimization Based on Taguchi Approach
...Show More Authors

This study depicts the removal of Manganese ions (Mn2+) from simulated wastewater by combined electrocoagulation/ electroflotation technologies. The effects of initial Mn concentration, current density (C.D.), electrolysis time, and different mesh numbers of stainless steel screen electrodes were investigated in a batch cell by adopting Taguchi experimental design to explore the optimum conditions for maximum removal efficiency of Mn. The results of multiple regression and signal to noise ratio (S/N) showed that the optimum conditions were Mn initial concentration of 100 ppm, C.D. of 4 mA/cm2, time of 120 min, and mesh no. of 30 (wire/inch). Also, the relative significance of each factor was attained by the analysis of variance (ANOVA) which indicates that the percentage of contribution followed the order: time (47.42%), C.D. (37.13%), Mesh number (5.73%), and Mn initial Conc. (0.05%). The electrolysis time and C.D. were the most effective operating parameters and mesh no. had a fair influence on Mn removal efficiency, while the initial conc. of Mn. had no significant effect in the studied ranges of control factors. Regression analysis (R2= 90.16%) showed an acceptable agreement between the experimental and the predicted values, and confirmation test results revealed that the removal efficiency of Mn at optimum conditions was higher than 99%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 17 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Micro CT analysis of amount of dentin removal created by SAF vs. ProTaper systems
...Show More Authors

Background: Dentin removed during root canal system instrumentation for creating adequate geometry for the canal and cleaning the canal. A new instrument had been marketed with the aim of optimum shaping of all parts of the canal system, however, no information present about the amount of dentin removal compared to conventional rotary system. This study investigated the amount of dentin removal when the canal instrumented by SAF compared with ProTaper by using high resolution computed tomography (micro CT). Materials and Methods: Twenty extracted single canalled teeth were utilized for this study; and randomly divided into 2 groups. In the first group, the root canals were prepared by using protaper rotary system till F2 and the root canal

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Publication Date
Fri Dec 12 2003
Journal Name
Iraqi Journal Of Laser
Carbon Dioxide Laser Treatment of Viral Warts: A New Approach
...Show More Authors

Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Potential of Microalgae Cultivation in Dairy Wastewater as a Step in Low-Cost Biofuel Production
...Show More Authors

The present study addresses adopting the organic and nutritious materials in dairy wastewater as media for cultivation of microalgae, which represent an important source of renewable energy. This study was carried out through cultivation of three types of microalgae; Chlorella sp., Synechococcus, and Anabaena. The results shows the success the cultivation of the Synechococcus and  Chlorella Sp, while the Anabaena microalgae were in low-growth level. The highest growth was in the Synechococcus farm, followed by Chlorella and Anabaena. However, the growth of Synechococcus required 10 days to achieve this increase that re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Stability constant measurements of thorivm (lv) and uranyle ions with some amino acids
...Show More Authors

ne,؛Stability constants were determined for complexes of amino acids : L-leuc tryptophane and Aspartic acid with thorium (IV ) and uranyle ( U02++) ions at ؛ serine

View Publication Preview PDF