Preferred Language
Articles
/
txcJ8pEBVTCNdQwC75yW
Zinc (II) removal from simulated wastewater by electro-membrane extraction approach: Adopting an electrolysis cell with a flat sheet supported liquid membrane
...Show More Authors

The aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elimination. Two distinct carriers, namely tris(2-ethylhexyl) phosphate (TEHP) and bis(2-ethylhexyl) phosphate (DEHP) were evaluated, in a tandem with utilization of 1-octanol. The results revealed essential role played by the applied voltage in augmenting the rate of mass transfer of zinc across the membrane. The best operating conditions were utilized for 1-octanol enriched with 1.0 vol.% bis(2-ethylhexyl) phosphate as a carrier, applied voltage of 60 V, initial pH of 5, initial zinc concentration of 15 mg L-1, extraction duration of 6 hours, and stirring rate of 1000 rpm. Surprisingly, operating under these meticulously devised conditions culminated in the outstanding removal efficiency of 87.3 %. In comparison with no applied voltage, a substantial enhancement in removal efficiency was observed, trans­cending from a meager 36.67 % to an impressive 87.3 % at 60 V, suggesting thus a tremen­dous potential of EME as an efficacious technique for the elimination of heavy metals.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The extent of compliance with the Central Bank’s of Iraq instructions regarding the liquidation real estate allocation and its impact on the fairness of the financial statements : An applied research
...Show More Authors

 The financial statements   must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74)  2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2  concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision  at  a  rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years  .also from  the significance of the issue of  real estates that become a property of   banks as a result of debt settlement and the pr

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Product of Conjugacy Classes of the Alternating Group An
...Show More Authors

For a nonempty subset X of a group G and a positive integer m , the product of X , denoted by Xm ,is the set Xm = That is , Xm is the subset of G formed by considering all possible ordered products of m elements form X. In the symmetric group Sn, the class Cn (n odd positive integer) split into two conjugacy classes in An denoted Cn+ and Cn- . C+ and C- were used for these two parts of Cn. This work we prove that for some odd n ,the class C of 5- cycle in Sn has the property that = An n 7 and C+ has the property that each element of C+ is conjugate to its inverse, the square of each element of it is the element of C-, these results were used to prove that C+ C- = An exceptio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Introduction to Gender in Feminine Literature and Criticism
...Show More Authors

The Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with ano

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Leverage: An Empirical Research
...Show More Authors

The research objective are analyze financial leverage advantage through analyze and discuss financial leverage cost, and achieve tax advantage. study include two firms ,oil firm and industrial companies firm with limited liability.The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial leverage achieve present value of the costs is Negative . The study concluded that the most important conclusions of the tax advantage of leverage is higher costs as well as achieving a low tax shield ,This study found out the results that interest payments related to pre-tax all of the loan amount and the percentage of the interest rate on b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 21 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Analysis Tax Advantage of Financing Lease: An Empirical Study
...Show More Authors

The Purpose of this study are  analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial  lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 06 2016
Journal Name
Mathematical Theory And Modeling
The act of an operator and Abstract cauchy problem
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
An Investigation into the Behavior of Disc Blake Wear
...Show More Authors

A real method of predication brake pad wear ,could lead to substantiol economies of time and money. This paper describes how such a procedure has been used and gives the results to establish is reliability by comparing the predicted wear with that which actually occurs in an existing service. The experimental work was carried out on three different commercial samples ,tested under different operation conditions (speed,load,time...etc)using a test ring especially modified for this purpose. Abrasive wear is mainly studied , since it is the type of wear that takes place in such arrangements. Samples wear tested in presences of sand or mud between the mating surfaces under different operational conditions of speed, load and braking time .Mec

... Show More
View Publication Preview PDF