Preferred Language
Articles
/
ijcpe-724
The Decolorization of Reactive Yellow Dye by Advanced Oxidation Using Continuous Reactors
...Show More Authors

The reactive yellow azo dye (λmax = 420 nm) is widely utilized for textile coloring due to its low-cost stability and tolerance properties. Treatment of dye-containing wastewater by traditional methods is usually inadequate because of its resistance to biological and chemical degradation. From this research, the continuous reactor of an advanced oxidation method supported the use of H2O2/TiO2/UV to remove the coloration of the reactive yellow dye from the discharge. At constant best conditions obtained from the batch reactor tests pH=7, H2O2 dosage = 400 mg/l and TiO2=25mg/l , the aqueous solutions were tested in the continuous reactor at different dye concentration and different flow rates . The maximum removal efficiency was found to be 91.552% obtained at the flow rate 5 l/h, also the results of decomposition information proved that method was pseudo-first-order kinetics.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
A study of Land Zoning in the base of Traffic Noise Pollution Levels using ArcGIS: Kirkuk City as a Case Study
...Show More Authors

This study is an approach to assign the land area of  Kirkuk city [ a city located in the northern of Iraq, 236 kilometers north of  Baghdad  and 83 kilometers  south of  Erbil [ Climatic atlas of  Iraq, 1941-1970  ]  into different  multi zones by using Satellite image and Arc Map10.3,  zones of different traffic noise pollutions. Land zonings process like what achieved in this paper will help and of it’s of a high interest point for the future of Kirkuk city especially urban

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
measure the relationship between imported inflation and foreign trade in the Iraqi economy for long 1990-2015 using model nardl
...Show More Authors

The study aims to discuss the relation between imported inflation and international trade of Iraqi economy for the period (1990-2015) by using annual data. To achieve the study aim, statistical and Econometrics methods are used through NARDL model to explain non-linear relation because it’s a model assigned to measure non-linear relations and as we know most economic relations are non-linear, beside explaining positive and negative effects of imported inflation, and to reach the research aim deductive approach was adopted through using descriptive method to describe and determine phenomenon. Beside the inductive approach by g statistical and standard tools to get the standard model explains the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
comparison Bennett's inequality and regression in determining the optimum sample size for estimating the Net Reclassification Index (NRI) using simulation
...Show More Authors

 Researchers have increased interest in recent years in determining the optimum sample size to obtain sufficient accuracy and estimation and to obtain high-precision parameters in order to evaluate a large number of tests in the field of diagnosis at the same time. In this research, two methods were used to determine the optimum sample size to estimate the parameters of high-dimensional data. These methods are the Bennett inequality method and the regression method. The nonlinear logistic regression model is estimated by the size of each sampling method in high-dimensional data using artificial intelligence, which is the method of artificial neural network (ANN) as it gives a high-precision estimate commensurate with the dat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of College Of Education For Women
Main Difficulties Faced by EFL Students in Language Learning
...Show More Authors

Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung
...Show More Authors

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Conjunctive Adverbials Used by Iraqi Men and Women Authors
...Show More Authors

This paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose

View Publication Preview PDF
Publication Date
Sun May 02 2021
Journal Name
Knowledge-based Engineering And Sciences
Lead sorption from aqueous solutions by kaolinite: laboratory experiments
...Show More Authors

The lead has adverse effects in contamination the aquatic environment, for this reason, a laboratory simulation was conducted using kaolinite collected from the Ga’ara Formation at western Iraq to be considered as a natural sorbent material that can be addressed Pb2+ from the aqueous environments. The Energy-Dispersive X-ray Spectroscopy and atomic absorption spectroscopy clarifying very fine grains and pure phase with a very little quantity of quartz and has a number of active sites for adsorption. The sorption of kaolinite for the Pb2+ has been carefully tested by several designed laboratory experiments. Five lead solutions of different concentrations (25, 50, 75, 100 and 125 ppm) were tested under different values of pH (1.3-9)

... Show More
View Publication
Crossref (4)
Crossref