Preferred Language
Articles
/
joe-497
Zn(II) Removal from Wastewater by Electrocoagulation/Flotation Method using New Configuration of a Split-Plate Airlift Electrochemical Reactor
...Show More Authors

In this paper, split-plate airlift electrochemical reactor as an apparatus with new configuration for wastewater treatment was provided. Two aluminum plates were fixed inside the reactor and present two functions; first it works as split plates for internal loop generation of the airlift system (the zone between the two plates acts as riser while the other two zones act as downcomer) and second it works as two electrodes for electrocoagulation process. Simulated wastewater contaminated with zinc ions was used to test the performance of this apparatus for zinc removal by studying the effect of different experimental variables such as initial concentration of zinc (50-800 ppm), electrical current density (2.67-21.4 mA/cm2), initial pH (3-11), air flowrate (12-50 LPH), and implicitly the electrocoagulation time. The results have shown the applicability of this split-plate airlift reactor as electrocoagulation cell in the treatment of wastewater such as wastewater containing Zink ions. The Zink removal percent was shown to increase upon increasing the current density and the electrolysis time. Also best removal percent was achieved in the initial pH range between 7 and 9. The minimum electrocoagulation time required for removal of ≥ 90% of Zn(II) decreases from 90 to 22 min when operating current density increases from 2.67 to 21.4 mA/cm2.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
Study of the Toxic effect of new Cadmium ( II) complex [ CdL2]. 1/2H2O on GPT and ALP activity in some organs of female mice comparable with anitumor drug Cyclophosphamide (CP)
...Show More Authors

Cadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 25 2020
Journal Name
Journal Of Clinical Medicine
Self-Limiting versus Rotary Subjective Carious Tissue Removal: A Randomized Controlled Clinical Trial—2-Year Results
...Show More Authors

Background: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit

... Show More
View Publication
Scopus (8)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Zenali Iteration Method For Approximating Fixed Point of A δZA - Quasi Contractive mappings
...Show More Authors

This article will introduce a new iteration method called the zenali iteration method for the approximation of fixed points. We show that our iteration process is faster than the current leading iterations  like Mann, Ishikawa, oor, D- iterations, and *-  iteration for new contraction mappings called  quasi contraction mappings. And we  proved that all these iterations (Mann, Ishikawa, oor, D- iterations and *-  iteration) equivalent to approximate fixed points of  quasi contraction. We support our analytic proof by a numerical example, data dependence result for contraction mappings type  by employing zenali iteration also discussed.

View Publication Preview PDF
Crossref (2)
Crossref