Preferred Language
Articles
/
ijp-605
Immobilization of Nuclear Waste Using Carbon Nanotubes Prepared by Laser Ablation in Liquid Method
...Show More Authors

In an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs).  The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the  new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radiation damage on CNTs structure, the sample was irradiation by Beta source (90Sr/90Y) for different period of time. The structure properties were measured using X-ray diffraction XRD while the shape and size property was measured by scanning electron microscope SEM.

The result shows homogenous distribution of nanoparticles with average particle size about 20nm. The XRD spectra for all sample before and after irradiation shows the higher peaks that it’s almost appearance at 2  = 25 degree and when compared the XRD phase with Standard card the resultant nanomaterial is Strontium carbonite (SrCo3). From SEM micrograph, CNTs-SrCO3 were well decorated on the surface of CNTs and there was not any remarkable difference in the corresponding due to Beta radiation exposure.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Desalination And Water Treatment
Elucidation of the removal of trivalent and divalent heavy metal ions from aqueous solutions using hybrid-porous composite ion-exchangers by nonlinear regression
...Show More Authors

View Publication
Scopus (24)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
DIFFICULTIES IN USING THE INTERNET IN THE TEACHING OF SCIENCES
...Show More Authors

The present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A New Analytic Method to Tune a Fractional Order PID Controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Proposed Analytical Method for Solving Fuzzy Linear Initial Value Problems
...Show More Authors

     In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements  and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (7)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (1)
Scopus
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (57)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref