Preferred Language
Articles
/
joe-816
Removal of Methyl Orange from Aqueous Solutions by Adsorption Using Corn Leaves as Adsorbent Material
...Show More Authors

A comparative study was done on the adsorption of methyl orange dye (MO) using non-activated and activated corn leaves with hydrochloric acid as an adsorbent material. Scanning electron microscopy (SEM) and Fourier Transform Infrared spectroscopy (FTIR) were utilized to specify the properties of adsorbent material. The effect of several variables (pH, initial dye concentration, temperature, amount of adsorbent and contact time) on the removal efficiency was studied and the results indicated that the adsorption efficiency increases with the increase in the concentration of dye, adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature for both the treated and untreated corn leaves. The equilibrium data is best fitted to Freundlich isotherm for untreated adsorbent, while Langmuir isotherm show best agreement with the data when the treated adsorbent is used. The rate of adsorption was found to follow the pseudo first order kinetic model (PFO) when non-activated adsorbent is used, while the pseudo second order model (PSO) is fitted to the adsorption data using activated adsorbent.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of College Of Education For Women
Main Difficulties Faced by EFL Students in Language Learning
...Show More Authors

Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Conjunctive Adverbials Used by Iraqi Men and Women Authors
...Show More Authors

This paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Plasmid role in agar utilization by Pseudomonas sp. HK1
...Show More Authors

Forty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Main Difficulties Faced by EFL Students in Language Learning
...Show More Authors

Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers.  This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning.  A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study wh

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Al- Mustansiriyah Journal Science
Convex Approximation by q- Meyer-König-Zeller Durrmeyer Operators
...Show More Authors

Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Carbon Nanoparticles Synthesis By Different Nd:Yag Laser Pulse Energy
...Show More Authors

One of the most important techniques for preparing nanoparticle material is Pulsed Laser Ablation in Liquid technique (PLAL). Carbon nanoparticles were prepared using PLAL, and the carbon target was immersed in Ultrapure water (UPW) then irradiated with Q-switched Nd:YAG laser (1064 nm) and six ns pulse duration. In this process, an Nd:YAG laser beam was focused near the carbon surface. Nanoparticles synthesized using laser irradiation were studied by observing the effects of varying incident laser pulse intensities (250, 500, 750, 1000) mJ on the particle size (20.52, 36.97, 48.72, and 61.53) nm, respectively. In addition, nanoparticles were characterized by means of the Atomic Force Microscopy (AFM) test, pH easurement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF