Preferred Language
Articles
/
joe-261
Removal of Fluoride Ions from Wastewater Using Green and Blue-green Algae Biomass in a Fluidized Bed System

The removal of fluoride ions from aqueous solution onto algal biomass as biosorbent in batch and continuous fluidized bed systems was studied. Batch system was used to study the effects of process parameters such as, pH (2-3.5), influent fluoride ions concentration (10- 50 mg/l), algal biomass dose (0–1.5 g/ 200 ml solution), to determine the best operating conditions. These conditions were pH=2.5, influent fluoride ions concentration= 10 mg/l, and algal biomass dose=3.5 mg/l. While, in continuous fluidized bed system, different operating conditions were used; flow rate (0.667- 0.800 l/min), bed depth (8-15 cm) corresponded to bed weight of (80- 150 g). The results show that the breakthrough time increases with the increase of bed depth but decreases with the increase of flow rate. Thomas and Yoon-Nelson models were used to analyze the experimental data and there was a good matching between the theoretical and the experimental data for both models. Desorption studies indicate that NaOH solutions at different pH values (8-10) were used to recover the fluoride ions sorbed onto the algal biomass. It is noteworthy that the desorption efficiency at pH =10 remains close to 95 % of the initial value of sorption capacity. So the desorption performance remains appreciable.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
Semiotic criteria for analyzing religious symbols in press reports Qantara news site as a model

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the problem of the semiotic employment of religious symbols in press reports published in the electronic press across two levels: Reading to perceive the visual message in its abstract form, and the second for re-understanding and interpretation, as this level gives semantics to reveal the implicit level of media messages through a set of semiotic criteria on which it was based to cut texts to reach the process of understanding and interpretation.

The report includes a group of symbols that are employed within a framework that gives a language of greater impact. This research discusses the p

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Gravity Field Interpretation for Major Fault Depth Detection in a Region Located SW- Qa’im / Iraq

This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-

... Show More
Scopus (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
Scopus (6)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Quantitative Interpretation of Gravity and Magnetic Anomalies in West of Tikrit City and Surroundings, Iraq

     A quantitative interpretation of gravity and magnetic anomalies in west of Tikrit city and surroundings, has been completed utilizing Grav2dc and Mag2dc (2D, 2.5D) forward techniques. The modeling has been carried out along four profiles, two NW-SE profiles along the distinct gravity residual anomalies and two NE-SW profiles along the magnetic residual anomalies. The most geologic plausible model that matches the data was picked. The model along the gravity profile (A-A') reveal faulting of the basement, whereas along the profiles B-B', C-C' and D-D' did not present faulting. The models comprise of two rock units, the first is the sedimentary cover and the second unit i

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis” Meta Gene (2020) 7–7/100832

Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro

... Show More
View Publication
Publication Date
Sat Sep 02 2017
Journal Name
Dissertation
Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 18, Nº. 1, 2023, Págs. 19-29
Constructing A Measure of Psychological Disability and Its Relationship to Some Basic Skills and Fixed Playing Situations for Youth Football Players Under (19) Years Old

Autorías: Muwafaq Obayes Khudhair, Sanaa Rabeea Abed, Hayder Talib Jasim. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2023. Artículo de Revista en Dialnet.

View Publication Preview PDF
Publication Date
Tue Jan 02 2007
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Seropidemiology Of Human Hydatidosis In Kirkuk And Tikrit/ Iraq

Background: Hydatid disease is a serious infection of man caused by larval stage (hydatid) of the small dog tapeworm. Serological tests are important in the diagnosis of hydatid
disease.
Objectives: The study was carried out to detect the rate of seropositivity of hydatid cysts in Kirkuk and Tikrit cities.
Materials and Methods: The retrospective hospital based and seroepidemiological studies were carried out in Kirkuk and Tikrit cities, during the period from beginning of January
2000 until the end of October 2003. The hospital based study included 125-hydatid cyst operations in hospitals of Kirkuk (82) and Tikrit (43). The serological tests used for
detection of hydatid cysts antibody were latex agglu

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review

With the explosive growth of the internet and its wide usage in our lives over the last few years, data security is one of the most important for anyone using it. Data security guarantees that the sending data can be accessed and read by only authorized persons and ensure no change happens in this data. There are many methods used to achieve this goal. One of the most common methods is cryptography, which is used to convert data to unreadable data by human eyes, except if the sender uses the same algorithm and key. This paper reviews some research dealing with cryptography and shows the different methods applied in cryptography fields for various security purposes.

Publication Date
Thu Sep 15 2022
Journal Name
Al-adab Journal
Crossref
View Publication