Preferred Language
Articles
/
ijcpe-416
Differences Between Sodium Metasilicate and Silicic Acid as Silica Source for Zeolite Y Nano particles Synthesis by Sol- Gel Method
...Show More Authors

Zeolite Y nanoparticles were synthesized by sol - gel method. Dffirent samples using two silica sources were prepared.
Sodium metasilicate (Na2SiO3) (48% silica) and silicic acid silica (H2SiO3) (75% silica) were employed as silica
source and aluminum nitrate (Al(NO3)3.9H2O) was the aluminum source with tetrapropylammonium hydroxide
(TPAOH) as templating agent.
The synihesized-samples were characterized by X-ray diffraction, showed the requirement of diffirent aging time for
complete crystallization to be achieved. Transmission Electronic Microscope (TEM) images, showed the particles were
in the same range of 30 - 75 nm. FT-IR spectroscory, showed the synthesized samples having the zeolite Y crystal
properties. The initial mixing silica to alumina ratio (SiO2/Al2O3) was 10, but, sodium metasilicate sample was of 2.55
final ratio, while silicic acid sample have 18.41 and the surface area as tested by BET was of 555.87 m2/g from sodium
metasilicate sample and 276.3 m2/g from silicic acid sample.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 16 2017
Journal Name
Iosr Journal Of Pharmacy And Biological Sciences(iosr-jpbs)
The relationship between Rheumatoid Arthitis and prevalence of Cytomegalovirus and Helicobacter pylori
...Show More Authors

Publication Date
Wed Mar 20 2030
Journal Name
College Of Islamic Sciences
equality between man and woman                           Among Islamic law               International conventions and agreements
...Show More Authors

equality between man and woman
                          Among Islamic law
              International conventions and agreements

View Publication Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
International Journal Of Health Sciences
Association between periostin and bone minerals in osteoporosis and osteopenia Iraqi patients
...Show More Authors

Background: osteoporosis is characterized by a reduction in bone mineral density, skeletal microstructure breakdown, increased bone fragility, and fracture susceptibility. Osteopenia is the preceding step to osteoporosis because it causes a decrease in bone mass, osteoporosis reduces a person's quality of life. Periostin (encoded by Postn), its name is derived from the fact that it was first detected in periosteal osteocytes and osteoblasts. Periostin deficiency has been linked to osteoporosis and weak bones. Study objectives: The purpose of this study was to determine periostin levels in serum of Iraqi patients with osteoporosis and osteopenia, and it is also possible to consider periostin as a diagnostic factor to follow the progression o

... Show More
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Some Metal Ions Complexes Derived From Schiff Base Ligand with Anthranillic Acid: Preparation, Spectroscopic and Biological Studies: organic chemistry
...Show More Authors

This search includes the preparation of Schiff base ligand (SB) from condensation primary amine with vanillin. The new ligand was diagnosed by spectroscopic methods as Mass, NMR, CHN and FTIR. Ligand complexes were mixed from new (SB) and Anthranillic acid (A) with five metal (II) chlorides. The preparation and diagnosis were conducted by FTIR, CHN, UV-visible, molar conductivity, atomic absorption and magnetic moment. The octahedral geometrical shape of the complexes was proposed. The ligands and their new complexes were screened with two different types of bacteria.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Image data compression by using multiwavelete for color image
...Show More Authors

There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja

View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Synthesized copper nanoparticles by sonoelectrodeposition for gas filter applications
...Show More Authors

Copper nanoparticles (CuNPs) were prepared with different diameters by sonoelectrodeposition technique using Electrodeposition process coupled with high-power ultrasound horn (Sonoelectrodeposition). The particle diameter of the CuNPs was adjusted by varying CuSO4 solution acidity (pH) and current density. The morphology and structure of the CuNPs were examined by X-ray diffraction (XRD) and Scanning Electron Microscopy (SEM). It was found that the size of the produced copper nanoparticles ranged between 22 to 77 nm, where the diameter of CuNPs increases with reduction the solution acidity from 0.5 to 1.5 pH and increasing the current density of the deposition from 100 to 400 nm. Finally the produced CuNPs were pressed to fabricate disc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view o

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More