Preferred Language
Articles
/
kBeA_40BVTCNdQwCPSy_
Modification, Characterization of Tea Residue-derived Activated Carbon, and Ciprofloxacin Adsorption
...Show More Authors

تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط  (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت  دراسة عدة عوامل تشغيلية  بدرجة حرارة الغرفة لمعرفة تأثيرها على كفاءة الامتزاز. تشمل هذه العوامل التركيز الأولي لـ CIP الممتز، ومستوى الرقم الهيدروجيني، وزمن الامتزاز، وكمية المادة المازة. تم اختبار خصائص الكربون المنشط باستخدام التحليل الطيفي للأشعة تحت الحمراء (FTIR)، والمجهر الماسح الإلكتروني (SEM)، وحيود الأشعة السينية (XRD)، وحساب المساحة السطحية والحجم المسامي بطريقة  (BET). تمت دراسة نمط الامتزاز وتبين بان نموذج Langmuir هو الموديل المناسب لعملية امتزاز CIP  على الكربون المنشط بالشاي  .(TAC)يتمتع الكربون المنشط المنتج بالقدرة على امتصاص السيبروفلوكساسين، بقدرة امتصاص قصوى تبلغ 256.41 ملغم/غرام. تمت دراسة حركية الامتزاز وتبين انه يمكن تمثيلها  بتفاعل من  الدرجة الثانية.

Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Attitudes and policies toward Turgut Ozal issue Kurdish 1984-1993
...Show More Authors

After receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance Comparison between Recycled Single Stage and Double Stage Hydrocyclones
...Show More Authors

   This research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
The Collapsible Soil, Types, Mechanism, and identification: A Review Study
...Show More Authors

Collapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
College Of Islamic Sciences
Distress disorder and the tendency to pray among martyrs' wives
...Show More Authors

The research aimed at identifying  the level of Acute stress disorder  and orientation towards supplication among the wives of the martyrs and knowledge of the two levels according to the age groups, academic achievement and profession. Sample of (72) wife of a martyr, and the results of the research indicated that the wives of the martyrs have symptoms of distress disorder and have adherence to the supplication to alleviate that disorder, as well as the results indicated that there are statistical differences in distress disturbance according to the variable of age groups, the profession variable and the variable of enrollment The academic year. As for the measure of the trend towards supplication, there are no statistical dif

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laminar Natural Convection in nonrectangular Enclosure with and without Fins
...Show More Authors

In the present work, steady, laminar natural convection in nonrectangular enclosures is analyzed numerically with and without fin. Vertical walls insulated while horizontal walls maintained isothermal at different temperature and the fin was placed on horizontal surface. The length of fin was equal (B/L=0.22, 0.44 and 0.66) and thickness of fin was constant. Various parameters are studied: Rayleigh number (from 104 to 107 ), Prandtl number (0.7), number of fin change from (1-3) and aspect ratio (H/L= 0.15 to 0.5). The problem is formulated in terms of the vorticity-stream function procedure. A numerical solution based on program in Fortran 90 with Tec plot program. The finite difference method is used. Streamlines and isotherms are prese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2012
Journal Name
First Eage Workshop On Iraq - Hydrocarbon Exploration And Field Development
Microfacies and Petrographic study for Yamama formation in Ratawi field
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More