Preferred Language
Articles
/
joe-2251
Detection and Removal of Polycyclic Aromatic Hydrocarbon from Selected Areas in Tigris River in Baghdad City
...Show More Authors

Aromatic hydrocarbons present in Iraqi national surface water were believed to be raised principally from combustion of various petroleum products, industrial processes and transport output and their precipitation on surface water.
Polycyclic aromatic hydrocarbons (PAHs) were included in the priority pollutant list due to their toxic and carcinogenic nature. The concern about water contamination and the consequent human exposure have encouraged the development of new methods for
PAHs detection and removal.
PAHs, the real contaminants of petroleum matter, were detected in selected sites along Tigris River within Baghdad City in summer and winter time, using Shimadzu high performance liquid chromatography (HPLC) system.
Analysis of samples from selected sites proved that the most abundant component of aromatic hydrocarbons were phenanthrene naphthalene, and acenaphthylene, followed by fluorene, acenaphthene, fluoranthene, benzo (a) pyrene, anthracene. and pyrene were
present in low concentrations ranging in a descending order. Chrysene and benzo (a) anthracene were found in very low concentration.
A laboratory unit was designed to optimize the factors which may influence the feasibility of degradation processes of naphthalene and phenanthrene in aqueous matrices by oxidation with Fenton reagent. The study proved that 83% and 79% removal of naphthalene and phenanthrene were achieved applying optimum conditions of pH=3, temperature=40 ° C, H2O2=50 ppm and Fe2+ catalyst = 6 ppm

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Extrapolating working names verb act in the Koran in the books of Iraqi researchers and their theses from 1968-2000 m: (Collection and descriptive study)
...Show More Authors

This research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
    The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
The Role of Filamentous Bacteria Streptomyces sp. in Reduction of Some Nutrients Concentrations in AL- Restomia Waste water Treatment Plant, Baghdad -Iraq
...Show More Authors

The role of filamentous bacteria represented by Streptomycessp was studied as biological treatment for activated sludge AL- Restomia treatment unit in Baghdad city. The result shows reducing in phosphate concentration where apprise in started entrance the treatment unit 12.083 mg/L fast the unit stages reached to 8.426 mg /L where nitrate concentration apprises 3.59 mg/l and ending in 2.43 mg/L The concentration of ammonia apprises 1358 mg/L and reached to 140 mg/L. also the TDS concentration reduced from 1426 to 1203 mg/L where nutrient which represented (SO4, Mg, Ca, Na, K) reduced by range 30.883- 23.337 , 194- 121 , 440- 321 , 109.03- 101.53 and 16.85- 15.4mg/L respectively COD reduce from427.263- 82mg/L with absorbance0.018- 0.027

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Succession Planning In Human Capital Development In Organizations ( the Field of the research at the Oil Training Institute – Baghdad
...Show More Authors

 

  To identify the importance of the role of succession planning in developing human capital in organizations in light of the accelerating and dynamic events and changes in the work environment, and the research problem indicated the seriousness of employees retiring or leaving their positions for any reason and the extent of its impact on the organization in creating gaps in leadership and problems In managing the talent injection because there will be a shortage of talent, which in turn will affect the general performance of the business in the researched institute, so the importance of research appears in trying to present a set of solutions through which some of the problems facing the organization in quest

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 31 2016
Journal Name
International Journal Of Advanced Research
SINGLE NUCLEOTIDE POLYMORPHISMS (SNPS) IN EXON 3 AND 7 OF ESTROGEN RECEPTOR BETA (ESR2) GENE IN WOMEN WITH BREAST CANCER FROM IRAQ.
...Show More Authors

This study was aimed to determine the mutations and single nucleotide polymorphisms (SNPs) in exon 3 and 7 of estrogen receptor beta (ESR2) gene in women with breast cancer from Iraq. Different samples (blood, fresh tissue with blood from same patient, and formalin fixed paraffin embedded, FFPE) were collected from women with breast cancer. Molecular analysis exon 3 and 7 in ESR2 has been studied by using PCR. It was found exon 3 and 7 in ESR2 were revealed as a single band with size 151 and 157 bp, respectively. There was no SNP in exon 3 has been identified. While three novel polymorphisms (ACT, AGG and GCA) were detected in exon 7, the type of those polymorphisms deletion for ACT and AGG while substitution polymorphism for GCA. From this

... Show More
View Publication
Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Biochemical And Cellular Archives
SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
...Show More Authors

SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS

Scopus (3)
Scopus
Publication Date
Tue Nov 13 2018
Journal Name
Biochemical And Cellular Archives
Synthesis, characterization, structural, thermal, POM, studies, antimicrobial, and DNA cleavage activity of a new schiff base-azo lighand and its complexation with selected metal ions
...Show More Authors

RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2

View Publication
Publication Date
Sat Mar 20 2021
Journal Name
Psychology And Education
Analyzing the Mutual Impact between Accounting Profit and Stock returns for Joint Stock Companies Registered in Baghdad Stock Exchange
...Show More Authors

The research aims to test the two characteristics of the relationship between accounting profits and the stock returns, to find out the suitability of both of them in explaining the relationship between accounting profits and stock returns for joint stock companies registered in the Baghdad Stock Exchange, also aims to reaching the most appropriate specification for the relationship between the two variables of the company’s stock dealing in the Baghdad Stock Exchange, and get a set of results, the most important of which are: the ability of changing for both of these variables in the profits share and the stock level of the profits does not explain more than 9,9% of the market returns of the Iraqi Joint Stock Companies registered i

... Show More
View Publication
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref