Preferred Language
Articles
/
ijcpe-64
Removal of Dyes from Synthetic Wastewater by Agriculturalwaste
...Show More Authors

Adsorption is one of the most important technologies for the treatment of polluted water from dyes. Theaim of this study is to use a low-cost adsorbent for this purpose. A novel and economical adsorbent was used to remove methyl violet dye (MV) from aqueous solutions. This adsorbent was prepared from bean peel, which is an agricultural waste. Batch adsorption experiments were conducted to study the ability of the bean peel adsorbent (BPA) to remove the methyl violet (MV) dye. The effects of different variables, such as weight of the adsorbent, pH of the MV solution, initial concentration of MV, contact time and temperature, on the adsorption behaviour were studied. It was found experimentally that the time required to achieve equilibrium was 120 min for all dye concentrations (10-50 mg/l). The BPA was characterised using Fourier transform infrared (FTIR)before and after adsorption of the MV dye. Langmuir, Freundlich and Temkin isotherm models were used to analyse the experimental isotherm data. The Freundlich isotherm gives a better fit than the other isotherm models. The adsorption kinetic data were tested using pseudo-first-order and pseudo–second-order models. Additionally, the intraparticle diffusion model was used to investigate the mechanism of the adsorption process. It was found that boundary layer diffusion (external mass transfer) is the rate-determining step. The thermodynamic parameters, including ΔH, ΔS and ΔG, were investigated at different temperatures (298, 313 and 323 K) and concentrations (5, 10, 20 and 30 mg/l) to understand the nature of the adsorption process. The thermodynamic study indicates that the adsorption of MV dye onto BPA is physical, exothermic and spontaneous in nature.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The Scientific Efforts of Ahmed Mustafa Al-Maraghi
...Show More Authors

This conducted research,  (The Scientific Efforts of Ahmed Mustafa Al-Maraghi) deals with Al-Maraghi's life, birth, upbringing, characteristics, title, family and religion secter, as well as his general biography. And his relationship with scholars, his learning and teaching, and the introduction of the Muhammed Abdo School and the College of Dar Al Uloom, and finally the discussion  of his scientific, social and political poin of view, as an interpreter of twentieths century, was  appointed as the president of Al-Azhar and Ifta during the days of the royal era, and he studied at the College of Dar Al-Uloom

 

View Publication Preview PDF
Publication Date
Sun May 20 2018
Journal Name
Romansy 22 – Robot Design, Dynamics And Control
Decentralized Adaptive Partitioned Approximation Control of Robotic Manipulators
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 15 2025
Journal Name
Journal Of Babylon Center For Humanities Studies
The homeland in the product of Sami Michael
...Show More Authors

Our research addresses one of the aspects of nostalgia for one of the most well-known Israeli writers of Iraqi origin (Sami Michael) who spent his childhood in Baghdad. The Israeli government has also been forced to emigrate with its family as a result of the Zionist propaganda that the Zionist institutions have followed since the early decades of this century in the Arab unrest and massacres. The fact that the homeland is like a mother is A fact that is compelling and something of an expatriate human being; the homeland is a fact that remains in the person's consciousness to be the image of the mother: The lover, love, safety, identity. The language that is formulated, and the memories that make its past, present and future, are all concep

... Show More
View Publication
Publication Date
Thu Oct 31 2024
Journal Name
Archive Of Mechanical Engineering
Computational analysis of SD7037 airfoil with plain flap
...Show More Authors

The impact of a simple trailing-edge plain flap on the aerodynamics of the SD7037 airfoil have been studied in this paper using computational fluid dynamics at Reynolds number of 3×105 across various low angles of attack and flap deflection angles. The computational model was evaluated by using Star CCM+ software with κ--ω SST turbulence and gamma transition model to solve Navier-Stokes equations. The accuracy of the computational model has been confirmed through comparison with experimental data, showing a high level of agreement at low angles of attack. The findings revealed that specific combinations of angles of attack and flap deflection angles could increase the lift-to-drag ratio by over 70% compared to baseline conditions, benefi

... Show More
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Hydraulic Analysis of the Samarra-Al Tharthar System
...Show More Authors

Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Psychological Adjustment among Preparatory School Students
...Show More Authors

Objectives: To assess the psychological adjustment of middle school students and to identify the relationship between differences in demographic characteristics and psychological adjustment.

Methodology: A descriptive correlation design was used. The study utilized a simple random sample to select (381) students using self-report to select students who will be recruited into the study for the period from November 26th, 2021 to April 1st, 2022. A scale approved in the study consisting of 40 items was chosen. It measures four trends which are personal, social, familial, and emotional adjustment. The data were analyzed by applying the descriptive statistical dat

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Engineering Research And Applications
Tenser Product of Representation for the Group Cn
...Show More Authors

Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
commuities of color performance in the Holy Quran
...Show More Authors

0

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Bayesian Computational Methods of the Logistic Regression Model
...Show More Authors
Abstract<p>In this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.</p>
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF