Preferred Language
Articles
/
ijs-6116
The adsorption of Cadmium and Lead Ions from aqueous solutions using non living biomass of Phragmites australis
...Show More Authors

Adsorption is a simplified new way, easy application , economical and environmentally friendly. In which the use of certain types of plants to remove or reduce toxic heavy metals from water. The current study involved the use of a non-living biomass as a powder for local plant available in the Iraqi environment is Phragmites australis .This the study showed the high ability of this plant to remove cadmium and lead ions from the aqueous solutions within variable experimental factors by column bed method which were used to test different sizes of plant powder were (500.1000, 1500 and 2000) μm . These sizes treated with initial concentration of Cd(II), Pb(II) was 25ppm , separately To test the optimum size for maximum adsorption and was 1000 μm . After that were tested different concentrations of Cd, Pb are (25, 50, 75, 100, 125,150,175,200)ppm with powder size of 1000 μm . And the optimum concentration was 100ppm. Different flow rates (0.5, 1, 1.5, 2) ml / min were tested with the powder size at 1000 μm and concentration for each metal was 100ppm and the optimum flow rate was 1 ml / min . All the experiments conducted at constant the mean of pH was 5, 32, temperature 22 ± 2 , contact time ranged (22-40) minutes. Results of statistical analysis showed that the optimum conditions of the maximum adsorption were at 1000 μm of powder size, 100ppm of initial metal concentration, flow rate of 1 ml / min and the high removal rates of cadmium and lead ions by P. australis were 95,16 % and 92.76% , respectively .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 26 2024
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Wasit Journal For Pure Science
β*-Regular supra topological spaces
...Show More Authors

Form the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.

Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Strong Differential Sandwich Results for Analytic Functions Associated with Wanas Differential Operator
...Show More Authors

    In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Iraqi Journal Of Science
Strongly Coretractable Modules
...Show More Authors

Let R be a ring with identity and M be a right unitary R-module. In this paper we
introduce the notion of strongly coretractable modules. Some basic properties of this
class of modules are investigated and some relationships between these modules and
other related concepts are introduced. 

View Publication Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
On Soft Turning Points
...Show More Authors

The soft sets were known since 1999, and because of their wide applications and their great flexibility to solve the problems, we used these concepts to define new types of soft limit points, that we called soft turning points.Finally, we used these points to define new types of soft separation axioms and we study their properties.

View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
New Generalizations for Ϻ-Hyponormal Operators
...Show More Authors

     This article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H.  Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation  where  ,  has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.  

View Publication Preview PDF
Scopus Crossref