Preferred Language
Articles
/
joe-2984
PREPARATION OF ACTIVATED CARBONS FROM DATE STONES BY CHEMICAL ACTIVATION METHOD USING FeCl3 and ZnCl2 as ACTIVATING AGENTS
...Show More Authors

Date stones were used as precursor for the preparation of activated carbons by chemical
activation with ferric chloride and zinc chloride. The effects of operating conditions represented
by the activation time, activation temperature, and impregnation ratio on the yield and adsorption
capacity towards methylene blue (MB) of prepared activated carbon by ferric chloride activation
(FAC) and zinc chloride activation (ZAC) were studied. For FAC, an optimum conditions of 1.25
h activation time, 700 °C activation temperature, and 1.5 impregnation ratio gave 185.15 mg/g
MB uptake and 47.08 % yield, while for ZAC, 240.77 mg/g MB uptake and 40.46 % yield were
obtained at the optimum conditions of 1.25 h activation time, 500 °C activation temperature, and
2 impregnation ratio. The equilibrium data for MB adsorption on prepared activated carbons at
optimum conditions were well represented by the Langmuir isotherm model, giving maximum
MB uptake of 304.51 and 387.54 mg/g for FAC and ZAC, respectively. Also, the results showed
that the surface area and iodine number of activated carbon prepared by activation with ferric
chloride at optimum conditions were 780.06 m2/g and 761.40 mg/g, respectively. While 1045.61
m2/g surface area and 1008.86 mg/g iodine number were obtained for ZAC prepared at optimum
conditions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 10 2011
Journal Name
Tikrit Journal Of Agricultural Sciences
ESTIMATION OF GENE ACTION AND GENETIC PARAMETERS FOR SOME VEGETATIVE AND FLOWERY GROWTH CHARACTERS IN SUMMER SQUASH (Cucurbita pepo L.) BY USING MEAN GENERATION ANALYSIS
...Show More Authors

An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three

... Show More
Publication Date
Tue May 14 2024
Journal Name
Iranian Journal Of Catalysis
Feasible and simple preparation of Pd (II), Ni (II), and Pt (IV) complexes: Their biological and industrial applications and investigation of Pd (II) complex in Suzuki reaction
...Show More Authors

A novel ligand, (E)-5-((2-hydroxy-4,6-dimethylphenyl)diazenyl)-2,3-dihydrophthalazine-1,4- dione, was synthesized through the reaction of 3,5-dimethylphenol with the diazonium salt of 5-amino-2,3-dihydrophthalazine-1,4-dione. The ligand underwent characterization through the utilization of diverse spectroscopic methods, including UV-Vis, FT-IR, 13C, and 1H-NMR, alongside Mass spectroscopy and micro elemental analysis (Carbon, Hydrogen, Nitrogen, and Oxygen). Metal chelates of transition metals were prepared and analyzed using elemental analysis, mass spectra, atomic absorption, UV-Vis, FT-IR spectral analysis, as well as conductivity and magnetic measurements. The investigation into the compounds’ nature was conducted by utilizing mole r

... Show More
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
The Calculation of the Charge Density Distributions and the Longitudinal Form Factors of 10 B Nucleus by Using the Occupation Numbers of the States
...Show More Authors

The charge density distributions of 10 B nucleus are calculated using the
harmonic oscillator wave functions. Elastic and inelastic electron scattering
longitudinal form factors have been calculated for the similar parity states of 10B
nucleus where a core of 4He is assumed and the remaining particles are
distributed over 3/ 2 1p and 1/ 2 1p orbits which form the model space.
Core-polarization effects are taken into account. Core-polarization effects are
calculated by using Tassie model and gives good agreement with the measured
data.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Physics And Research (ijpr)
CALCULATIONS OF MOLTIPOLE MIXING RATIOS FOR GAMMA TRANSITIONS OF Yb POPULATED FROM Yb REACTION USING -RATIO, CONSTANT STATISTICAL TENSOR AND LEAST SQUARES FITTING METHODS
...Show More Authors

The - mixing ratios of -transitions from levels in populated in the reactions are calculated in present work using - ratio, constant statisticalTensor and least squares fitting methods The results obtained are in general, in good agreement or consistent, within the associated uncertainties, with these reported in Ref.[9],the discrepancies that occurs are due to inaccuracy existing in the experimental data The results obtained in the present work confirm the –method for mixed transitions better than that for pure transition because this method depends only on the experimental data where the second method depends on the pure or those considered to be pure -transitions, the same results occur in – method

Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
The genetic inhibition of some pathogenic bacterial isolates related to Enterobacteriaceae by using Different leaves extracts of Cider (Nabag) Zizyphus spina-christa
...Show More Authors

The plant Zizyphus spina-christa grows wildly in the middle and southern of Iraq locally named Nabag. In this study the antibacterial activity of several different plant extract (alcoholic hot and cold extract 80%, aqueous hot and cold extract) was tested against some gram negative bacteria that related to Enterobacteriacea as follow; Pseudomonas aeruginosa, Escherchia coli Proteus mirabilis, Serratia mercesence,. Aeromonas sp, Klebsiella pneumoniae ,Shigella sp, Salmonella enteritidis (134), S. typhi(97), S. typhimurium (300) , S. typhi, . The results showed that efficient method of extract was alcoholic hot extract from other extract methods that are used in this study. The detection of active compound in crude extracts of the leaves show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Influence of Different Fabrication Techniques and Preparation Designs on the Marginal Adaptation of Ceramic Veneers (An In vitro Comparative Study)
...Show More Authors

Background: Ceramic veneers represent the treatment of choice in minimally invasive esthetic dentistry; one of the critical factors in their long term success is marginal adaptation. The aim of the present study is to evaluate the marginal gap of ceramic veneers by using two different fabrication techniques and two different designs of preparation. Material and methods: A typodont maxillary central incisor used in the preparation from which metal dies were fabricated, which were in turn used to make forty stone dies. The dies divided into four experimental groups, each group had ten samples: A1: prepared with butt-joint incisal reduction and restored with IPS e.max CAD, A2: prepared with overlapped incisal reduction and restored with IPS e.

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Siriraj Medical Journal
The Potential of Vitamin-D-Binding Protein as a Urinary Biomarker to Distinguish Steroid-Resistant from Steroid-Sensitive Idiopathic Nephrotic Syndrome in Iraqi Children
...Show More Authors

Objective: To determine the ability of uVDBP to discern SRNS from steroid-sensitive nephrotic syndrome (SSNS) in Iraqi children. Materials and Methods: This cross-sectional study enrolled children with SRNS (n=31) and SSNS (n=32) from the pediatric nephrology clinic of Babylon Hospital for Maternity and Pediatrics over three months. Patients' characteristics in terms of demographics, clinical data, and urinary investigations were collected. Quantitative analysis of uVDBP levels was undertaken via a commercially available ELISA kit. Results: The median uVDBP values were significantly higher (p-value<0.001) in the SRNS group (median=10.26, IQR=5.91 μg/mL) than in the SSNS group (median=0.953, IQR=4.12 μg/mL). A negative correlati

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref