Preferred Language
Articles
/
ijcpe-743
Reuse of Brick Waste as a Cheap-Sorbent for the Removal of Nickel Ions from Aqueous Solutions
...Show More Authors

   The potential application of granules of brick waste (GBW) as a low-cost sorbent for removal of Ni+2ions from aqueous solutions has been studied. The properties of GBW were determined through several tests such as X-Ray diffraction (XRD), Energy dispersive X-ray (EDX), Scanning electron microscopy (SEM), and BET surface area. In batch tests, the influence of several operating parameters including contact time, initial concentration, agitation speed, and the dose of GBW was investigated. The best values of these parameters that provided maximum removal efficiency of nickel (39.4%) were 1.5 hr, 50 mg/L, 250 rpm, and 1.8 g/100mL, respectively. The adsorption data obtained by batch experiments subjected to the Three isotherm models called Langmuir, Freundlich and Elovich, The results showed that the Freundlich isotherm model described well the sorption data (R2=0.9176) in comparison with other models. The kinetic data were analyzed using two kinetic models called pseudo-first-order and pseudo-second-order. The pseudo-first-order kinetic model was found to agree well with the experimental data.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Preparation of Polymeric Composites from Polypropylene and Palm Fronds and the Study of Some of Their Physical Properties
...Show More Authors

Abstract:
              In this study a type of polymeric composites from melting poly propylene as a basic substance with Palm fronds powder were prepared. Evaluation of polymeric composites was done by studying some of it is mechanical properties, which included:Yong modulus (E), Impact Strength (I.S), Brinell hardness (B.H) and Compression Strength (C.S). The polymeric composites were studied before and after reinforcment by comparing between them. There was an increase in resistance of Yong modulus (E), Impact Strength (I.S), Brinell hardness (B.H) and compression Strength (C.S). Also, the effect of some acids were studied such as (HCl, H2

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2011
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of essential oil extracted from yellow peel of Citrus aurantium L. on growth of some fungi
...Show More Authors

جريت دراسة مختبرية لمعرفة تأثير الزيت الطيار لقشور ثمار نبات النارنج الصفرC. aurantium تجاه النمو السطحي للفطريات Penicillium expansum، Aspergillus flavus و Fusarium oxysporum ، أظهرت نتائج الفعالية التثبيطية للزيت الطيار تأثيراً معنويا متفاوتاً في الفطريات المشمولة بالدراسة، إذ كان الزيت الطيار أكثر تأثيرأَ في الفطر P. expansum تلاه الفطر A. flavus ،في حين كان الفطر oxysporum F.أقل حساسية تجاه الزيت الطيار. بصورة عامة اظهر الزيت الطيار تأثيرا تثبيطيا

... Show More
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors

Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref