Preferred Language
Articles
/
joe-3171
Adsorption Of Phenol And P-Nitro Phenol Onto Date Stones: Equilibrium Isotherms, Kinetics and Thermodynamics Studies
...Show More Authors

Adsorption capacity of a waste biomass, date stones, for phenolic compounds such as phenol (Ph) and p-nitro phenol (PNPh) was investigated. The characteristics of such waste biomass were determined and found to have a surface area and iodine number of 495.71 m²/g and 475.88 mg/g, respectively. The effects of temperature, initial sorbate concentration, and contact time on the adsorption process were studied. Experimental equilibrium data for adsorption of Ph and PNPh on date stones were analyzed by the Langmuir, Freundlich and Sips isotherm models. The results show that the best fit was achieved with the Sips isotherm equation with maximum adsorption capacities of 147.09 and 179.62 mg/g for Ph and PNPh, respectively. The kinetic data were fitted to pseudo-first order, pseudo-second order and intraparticle diffusion models, and was found to follow closely the pseudo-second order model for both Ph and PNPh. The calculated thermodynamic parameters, namely AG, AH, and AS showed that adsorption of Ph and PNPh onto date stones was spontaneous and endothermic under examined conditions.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Psychological stress in unemployed individuals and its association with well being
...Show More Authors

The aim of this study is to detect the level of psychological stress among unemployed individuals and the level of their wellbeing by finding the correlation between these two variables.

          The research sample consisted of (99) people who are currently unemployed and registered at the Ministry of Labor Affairs.

Schafer (1996) scale for psychological stress was used and alongside Ziout's (2012) scale for wellbeing.

          The results of the research showed an inverse relation between being unemployed and having wellbeing.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Some Results in Grűnwald-Letnikov Fractional Derivative and its Best Approximation
...Show More Authors
Abstract<p>In This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.</p>
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 04 2023
Journal Name
Aip Conf. Proc
Double LA-transform and their properties for solving partial differential equations
...Show More Authors

Scopus (3)
Scopus
Publication Date
Mon Aug 10 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Geomechanical modelling and two-way coupling simulation for carbonate gas reservoir
...Show More Authors
Abstract<p>Geomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni</p> ... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Oli and Gas Explorations via Satellite Remote Sensing Techniques for AL_Nasiriya
...Show More Authors

     This study investigates data set as satellite images of type multispectral Landsat-7, which are observed for AL_Nasiriya city, it is located in southern of Iraq, and situated along the banks of the Euphrates River. These raw data are thermal bands of satellite images, they are taken as thermal images. These images are processed and examined using ENVI 5.3 program. Consequently, the emitted Hydrocarbon is extracted, and the black body algorithm is employed. As well as, the raster calculations are performed using ArcGIS, where gas and oil features are sorted. The results are estimate and determine the oil and gas fields in the city. This study uncovers, and estimates several unexplored oil and gas fields. Whereas,

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Sustainability
Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database
...Show More Authors

This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
The Correlation Between Salmonella typhi Associated Gallstone Formation and Gallbladder Cancer
...Show More Authors

    The current research focused on the detection of Salmonella typhi and its relationship with the formation of gallstone and gall bladder cancer. Samples were collected from patients aged between 32-67 years (males and females) in Mosul city hospitals. The samples included 30gallbladder fresh tissues from patients suffering from gallstone and 20 formalinfixed-paraffin embedded (FFPE) gallbladder tissue from patients confirmed with gallbladder cancer. The results showed that 33% S. typhi isolates were diagnosed from the tissue samples using conventional methods, biochemical tests and Vitek2. All fresh tissues samples gave positive PCR results for the presence of FliC-d and CdtB genes and 46% positi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref