Preferred Language
Articles
/
joe-2359
Uptake of Fluoride from Water Using Recycled Raw Beef Bone as an Environmently Freindly Waste
...Show More Authors

Excessive intake of fluoride, mainly through drinking water is a serious health hazard affecting humans worldwide. In this study, the defluoridation capacities of locally available raw waste beef bones have been estimated. Several experimental parameters including contact time, pH, bone dose, fluoride initial concentration, bone grains size, agitation rate, and the effect of co-existence of anions in actual samples of wastewater were studied for fluoride removal from aqueous solutions. Results indicated excellent fluoride removal effeciency up to 99.7% at fluoride initial concentration of 10 mg F/L and 120 min contact time. Maximum fluoride uptake was obtained at neutral pH range 6-7. Fluoride removal kinetic was well described by the pseudo-second order kinetic model. Both, Langmuir and Freundlich isotherm models could fit the experimental data well with correlation coefficient values > 0.99 suggesting favorable conditions of the process. Furthermore, it was found that the co-existing anions had no significant effect on fluoride removal. Ion exchange and fluoride precipitation are the modes of fluoride removal.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Mobile Position Estimation based on Three Angles of Arrival using an Interpolative Neural Network
...Show More Authors

In this paper, the memorization capability of a multilayer interpolative neural network is exploited to estimate a mobile position based on three angles of arrival. The neural network is trained with ideal angles-position patterns distributed uniformly throughout the region. This approach is compared with two other analytical methods, the average-position method which relies on finding the average position of the vertices of the uncertainty triangular region and the optimal position method which relies on finding the nearest ideal angles-position pattern to the measured angles. Simulation results based on estimations of the mobile position of particles moving along a nonlinear path show that the interpolative neural network approach outperf

... Show More
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Developing and Organizing an Easy Work Environment for Users of Computers Using Information Technology
...Show More Authors

The study aims to implement a serial security technology system to organize a comfortable work environment for users of computers in the General Directorate of Education in Baghdad Karkh3. The most important findings of the study are the application of a serial technology system. It is connected with scientific goals that show the scientific structure of computer learning and its applications.  It considers global learning systems and take into account the ease and scientific flow of the class of elderly employees. In addition, employees of other categories, are the outputs of the sequential technological system. The aim is to create a purposeful technological system and keep pace with global developments, to gain experience, skills and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis
...Show More Authors

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Computers And Concrete
Improving the seismic performance of reinforced concrete frames using an innovative metallic-shear damper
...Show More Authors

Scopus (9)
Scopus
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (28)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Impact of omega 3 alone or in combination with irinotecan on bone marrow and spleen of rats: in vivo study
...Show More Authors

Abstract

Objectives: The present study designed to explore the genotoxicity through measurement of Mitotic index in bone marrow and the spleen cells, as possible mechanism of bone marrow and spleen toxicity that induced by irinotecan; and to describe the protective actions of omega 3 against irinotecan induced genotoxicity in bone marrow and the spleen of rats.

Methods: Twenty four (24) rats (Sprague-Dawley) were randomly divided into four groups: Group Ӏ, rats  received single oral daily dose of distilled water (2 ml/kg) for 25 days (negative control group); Group ӀӀ (irinotecan-treated), receiv

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
An Improved Method to Recognize the Iraqi License Plates Using Local Projections
...Show More Authors

The License Plate (LP), is a rectangular metal plate that contains numbers and letters. This plate is fixed onto the vehicle's body. It is used as a mean to identify the vehicle. The License Plate Recognition (LPR) system is a mean where a vehicle can be identified automatically using a computer system. The LPR has many applications, such as security applications for car tracking, or enforcing control on vehicles entering restricted areas (such as airports or governmental buildings). This paper is concerned with introducing a new method to recognize the Iraqi LPs using local vertical and horizontal projections, then testing its performance. The attained success rate reached 99.16%, with average recognition time around 0.012 second for re

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 24 2024
Journal Name
Journal Of Plant Protection Research
Developing smart sprayer for weed control using an object detection algorithm (yolov5)
...Show More Authors

Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...

View Publication