Preferred Language
Articles
/
joe-2161
Development A Method For Production Of Carbon Nanotubes
...Show More Authors

In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also found that the use of (SSMC) leads to increase in yield by a factor of 3 of (SWNTs) and produces nanocoil at the same time.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives
An analysis for adoption of subsurface irrigation technology and its role in agricultural development in Iraq
...Show More Authors

Scopus
Publication Date
Thu Jul 04 2024
Journal Name
Pharmaceutics
Formulation Development of Meloxicam Binary Ethosomal Hydrogel for Topical Delivery: In Vitro and In Vivo Assessment
...Show More Authors

Abstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the

... Show More
Preview PDF
Scopus
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Pharmaceutical Sciences
Development and Evaluation of Biodegradable Particles Coloaded With Antigen and the Toll-Like Receptor Agonist, Pentaerythritol Lipid A, as a Cancer Vaccine
...Show More Authors

View Publication
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Basin or Intrusion, a New Method to Resolve Non-Uniqueness in Gravity Interpretation
...Show More Authors

The aim of the current paper is to resolve the non-uniqueness in gravity interpretation through searching for singular points in the gravity field that are coincide with causative body vertices. The Absolute Second Horizontal Gradient (ASHG) method is used to locate the horizontal reference location of the body, while its amplitude could be used to define body corner depth. Intelligent use of the ASHG method could help in differentiating between basin and intrusion structures from their gravity effect and could facilitate the interpretation in forward modeling and constrain inversion modeling to maximum limit. The method is tested by using many synthetic examples with different types of shapes. A real data is used to examine the method a

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
Adsorptive Removal of Furfural from Wastewater on Prepared Activated Carbon from Sawdust
...Show More Authors

Furfural is a toxic aromatic aldehyde that can cause a severe environmental problem especially the wastewater drown from petroleum refinery units. In the present work, a useless by-product from local furniture manufacturing industry; sawdust was used as raw material for the preparation of activated carbon which is chemically activated with phosphoric acid. The effect of adsorption variables which include initial pH of solution (2-9), agitation speed (50-250) rpm, agitation time (15-120) min, initial concentration of furfural (50-250) ppm, and amount of adsorbent material (0.5-2.5) g for the three adsorbents used (prepared activated carbon, commercial activated carbon and raw sawdust) were investigated in a batch process

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Physics Letters A
Wake potential of swift ion in amorphous carbon target
...Show More Authors

The wake potential and wake phenomena for swift proton in an amorphous carbon target were studied by utilising various dielectric function formalisms, including the Drude dielectric function, the Drude–Lorentz dielectric function and quantum dielectric function. The Drude model results exhibited a damped oscillatory behaviour in the longitudinal direction behind the projectile; the pattern of these oscillations decreases exponentially in the transverse direction. In addition, the wake potential extends slightly ahead of the projectile which also depends on the proton coordinate and velocity. The effect of electron binding on the wake potential, characterised by the ratio to 0.1, has been studied alongside the Drude–Lorentz dielectric

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Removal of Sulfate from Waste Water by Activated Carbon
...Show More Authors

Activated carbon was Produced from coconut shell and was used for removing sulfate from industrial waste water in batch Processes. The influence of various parameter were studied such as pH (4.5 – 9.) , agitation time (0 – 120)min and adsorbent dose (2 – 10) gm.

The Langmuir and frandlich adsorption capacity models were been investigated where showed there are fitting with langmmuir model with squre regression value ( 0.76). The percent of removal of  sulfate (22% - 38%) at (PH=7) in the isotherm experiment increased  with adsorbent mass increasing. The maximum removal value of sulfate at  different pH experiments is (43%) at pH=7.

View Publication Preview PDF
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Fatigue Behavior Of Chopped Carbon Fiber Reinforced Epoxy Composites
...Show More Authors

Hand-lay up method was used to prepare the samples made of epoxy (EP) as a matrix reinforced with chopped carbon fibers (CCF). The fatigue behavior of epoxy resin /chopped carbon fiber composites was studied with different weight percentage of chopped carbon fibers (2.5%,5%,7.5%,10%,12.5%). The fatigue test was carried out under alternate bending method, which was made by applying sinusoidal wave with constant displacement (15mm), stress ratio R=-1,and loading frequency 10Hz, which is believed to give a negligible temperature rise during the test. The results of the maximum stress, fatigue strength, fatigue limit and fatigue life of the tested composites are calculated from stress(S)-number of cycles(N) (S-N) curves.
It was shown that

... Show More
View Publication Preview PDF