Preferred Language
Articles
/
pBdtX5MBVTCNdQwCxtLB
Multicomponent Equilibrium Isotherms and Kinetics Study of Heavy Metals Removal from Aqueous Solutions Using Electrocoagulation Combined with Mordenite Zeolite and Ultrasonication
...Show More Authors

Combining different treatment strategies successively or simultaneously has become recommended to achieve high purification standards for the treated discharged water. The current work focused on combining electrocoagulation, ion-exchange, and ultrasonication treatment approaches for the simultaneous removal of copper, nickel, and zinc ions from water. The removal of the three studied ions was significantly enhanced by increasing the power density (4–10 mA/cm2) and NaCl salt concentration (0.5–1.5 g/L) at a natural solution pH. The simultaneous removal of these metal ions at 4 mA/cm2 and 1 g NaCl/L was highly improved by introducing 1 g/L of mordenite zeolite as an ion-exchanger. A remarkable removal of heavy metals was reported, as the initial concentration of each metal decreased from approximately 50 ppm to 1.19 for nickel, 3.06 for zinc, and less than 1 ppm for copper. In contrast, ultrasonication did not show any improvement in the treatment process. The extended Langmuir isotherm model convincingly described the experimental data; the Temkin and Dubinin-Radushkevich isotherm models have proven that the removal processes were physical and exothermic. Finally, the pseudo-second-order kinetics model appropriately explained the kinetics of the process with correlation coefficients of 0.9337 and 0.9016, respectively.

Scopus Crossref
View Publication
Publication Date
Sun Mar 01 2015
Journal Name
Sust Journal Of Engineering And Computer Science (jecs)
Virtual failure influence of Roseires dam on Khartoum city using HEC-RAS Hydraulic simulation modeling
...Show More Authors

Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi

... Show More
Publication Date
Wed Nov 05 2014
Journal Name
International Journal Of Applied Mathematical Research
Approximate solution of a model describing biological species living together using a new iterative method
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indian Journal Of Natural Sciences
Determination of the Electron Density Variation for Ionosphere Layer Over Iraqi Zone Using IRI Model
...Show More Authors

KA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1

View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Molecular Identification of Methylorubrum extorquens using PCR-Amplified MxaF Gene Fragments as A Molecular Marker
...Show More Authors

  Methylotrophs bacteria are ubiquitous, and they have the ability to consume single carbon (C1) which makes them biological conversion machines. It is the first study to find facultative methylotrophic bacteria in contaminated soils in Iraq. Conventional PCR was employed to amplify MxaF that encodes methanol dehydrogenase enzyme. DNA templates were extracted from bacteria isolated from five contaminated sites in Basra. The gene specific PCR detected Methylorubrum extorquens as the most dominant species in these environments. The ability of M. extorquens to degrade aliphatic hydrocarbons compound was tested at the laboratory. Within 7 days, gas chromatographic (GC) studies of remaining utilize

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 03 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Window Size Changing on Satellite Image Segmentation Using 2D Fast Otsu Method
...Show More Authors

Publication Date
Fri Mar 01 2024
Journal Name
Water, Air, & Soil Pollution
Decontamination of Cobalt-Polluted Soils Using an Enhanced Electro-kinetic Method, Employing Eco-friendly Conditions
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Eastern-european Journal Of Enterprise Technologies
Improvement of noisy images filtered by bilateral process using a multi-scale context aggregation network
...Show More Authors

Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Anticorrosion Behavior of Deposited Magnetite on Galvanized Steel in Saline Water Using RF-Magnetron Sputtering
...Show More Authors

Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Determine the optimal policy for the function of Pareto distribution reliability estimated using dynamic programming
...Show More Authors

The goal (purpose) from using development technology that require mathematical procedure related with high Quality & sufficiency of solving complex problem called Dynamic Programming with in recursive method (forward & backward) through  finding series of associated decisions for reliability function of Pareto distribution estimator by using two approach Maximum likelihood & moment .to conclude optimal policy

View Publication
Crossref