Preferred Language
Articles
/
joe-2550
Batch and Fixed-Bed Modeling of Adsorption Reactive Remazol Yellow Dye onto Granular Activated Carbon
...Show More Authors

In this work, the adsorption of reactive yellow dye (Remazol yellow FG dye) by granular activated carbon (GAC) was investigated using batch and continuous process. The batch process involved determination the equilibrium isotherm curve either favorable or unfavorable by estimation relation between adsorption capacity and concentration of dye at different dosage of activated carbon. The results were fitted with equilibrium isotherm models Langmuir and Freundlich models with R2value (>0.97). Batch Kinetic study showed good fitting with pseudo second order model with R2 (0.987) at contact time 5 h. which provesthat the adsorption is chemisorptions nature. Continuous study was done by fixed bed column where breakthrough time was increased at flow rates
(21.67, 12.5 and 6 ml/min) and initial dye concentration (80, 40, 20 and 10 mg/l) were decreased and bed depth was increased (5, 10, 15 and 20 cm). The adsorption data were fitted to the fixed-bed adsorption mathematical models Thomas and Yoon- Nelson models. The results fitted well to the Thomas and Yoon-Nelson models with correlation coefficient, R2≥ 0.944. Average relative error ARE% was applied to examine the theoretical and experimental results.
 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 29 2023
Journal Name
Pakistan Journal Of Ophthalmology
Corneal Parameters Measurement in Healthy Subjects Using Scheimpflug and Anterior Segment Optical Coherence Tomography
...Show More Authors

Purpose:  To compare the central corneal thickness (CCT),minimum corneal thickness (MCT) and corneal power measured using theScheimpflug-Placido device and optical coherence tomography (OCT) in healthy eyes. Study Design:  Descriptive observational. Place and Duration of Study:  Al-Kindy college of medicine/university of Baghdad, from June 2021 to April 2022. Methods:  A total of 200 eyes of 200 individuals were enrolled in this study. CCT and MCT measurements were carried out using spectral-domain optical coherence tomography (Optovue) and a Scheimpflug-Placido topographer (Sirius).The agreement between the two approaches was assessed using Bland-Altman analysis in this study. Results:  Mean age was 28.54 ± 6.6 years, me

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Technology And Health Care
Clinical management and infection control protocols during the COVID-19 pandemic: An online survey
...Show More Authors

BACKGROUND: SARS-CoV-2 (COVID-19) is considered a highly infectious and life threatening disease. OBJECTIVE: The present paper aims to evaluate various aspects of preventive measures and clinical management of the scheduled visits for orthodontic patients to the dental clinics during the outbreak of COVID-19, and to assess how orthodontists dealt with this challenge. METHODS: Orthodontists in private and public clinics were invited to fill a questionnaire that addressed infection control protocols and concerns about clinical management of patients in the clinics during the pandemic. Frequncies and percentages of the responses were obtained and compared using Chi-square tests. RESULTS: About 77% of those working in private clinics, a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison between diode laser and scalpel for lip lengthening in patients with gummy smile
...Show More Authors

Background: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
The Saudi Dental Journal
Different pulp capping agents and their effect on pulp inflammatory response: A narrative review
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Isvs E-journal
Preserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq
...Show More Authors

Preserving the Past and Building the Future: A Sustainable Urban Plan for Mosul, Iraq

Scopus (14)
Scopus
Publication Date
Wed Jan 17 2024
Journal Name
Journal Of Microbiology, Biotechnology And Food Sciences
Enterococcus faecium BACTERIOCIN EFFLUX PUMP MexA GENE AND PROMOTE SKIN WOUND HEALING IN MICE
...Show More Authors

The process involved isolating E. faecium from the gut of honeybees, screening the bacterium for bacteriocin-like inhibitory substance (BLIS), evaluating its impact on the expression of the mexA gene in multidrug-resistant (MDR) P. aeruginosa, and determining the role of bacteriocin in treating infected wounds in mice through histopathological examination. After evaluating the best circumstances for producing BLIS, it was discovered that glucose was a superior carbon source and yeast extract was the best source of nitrogen. The pH was found to be 5, the ideal incubation time was 72 hours, and ammonium sulfate salt was used for partial purification at 80% saturation. The identification of MDR P. aeruginosa isolates from pus infection

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Haematological and Demographic Study in Children Infected with Enterobiasis in Al Diwaniyah Province, Iraq
...Show More Authors

     Enterobius vermicularis infection is considered as one of the important causes of anaemia and malnutrition among children. This topic has recently received an increased amount of attention.  The objective of this study is to evaluate the demographical, anthropometrical, nutritional, and  haematological status of E. vermicularis infection among children. This study was conducted in Al Diwaniyah province, south of Iraq, for the period of October 2020 to the end of January 2021. The study included 122 children from both genders (males, n= 61, and females, n=61) and their ages ranged between 1 and 14 years. Nutritional status, body mass index (BMI), BMI percentile, and weight- for- age Z score were evaluated for some particip

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref