Preferred Language
Articles
/
txcJ8pEBVTCNdQwC75yW
Zinc (II) removal from simulated wastewater by electro-membrane extraction approach: Adopting an electrolysis cell with a flat sheet supported liquid membrane
...Show More Authors

The aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elimination. Two distinct carriers, namely tris(2-ethylhexyl) phosphate (TEHP) and bis(2-ethylhexyl) phosphate (DEHP) were evaluated, in a tandem with utilization of 1-octanol. The results revealed essential role played by the applied voltage in augmenting the rate of mass transfer of zinc across the membrane. The best operating conditions were utilized for 1-octanol enriched with 1.0 vol.% bis(2-ethylhexyl) phosphate as a carrier, applied voltage of 60 V, initial pH of 5, initial zinc concentration of 15 mg L-1, extraction duration of 6 hours, and stirring rate of 1000 rpm. Surprisingly, operating under these meticulously devised conditions culminated in the outstanding removal efficiency of 87.3 %. In comparison with no applied voltage, a substantial enhancement in removal efficiency was observed, trans­cending from a meager 36.67 % to an impressive 87.3 % at 60 V, suggesting thus a tremen­dous potential of EME as an efficacious technique for the elimination of heavy metals.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Solving a three dimensional transportation problem using linear programming
...Show More Authors

Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal image co

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Malnutrition: A Risk Factor in Childhood Acute Lymphoblastic Leukemia
...Show More Authors

Background: Malnutrition is an adverse prognostic factor in the outcome of children with standard risk acute lymphoblastic leukemia due to a significantly higher rate of bone marrow relapse in the malnourished patients. The event free survival of children with acute lymphoblastic leukemia in developed countries has increased substantially in the last two decades as treatment with intensive protocols has brought the estimated probability of event free survival at 5 years close to 75%. Although the prognosis of acute lymphoblastic leukemia has also been improved in underdeveloped countries, the figures for event free survival are lower, even when aggressive protocols are used. Unfavorable socioeconomic fa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 10 2021
Journal Name
Journal Of Legal Sciences
ISIS Violations of International Law “Iraq as a model”
...Show More Authors

The Iraqi people were subjected to the most brutal crime in the history of humanity when ISIS violated the rights system and targeted women, children, civilians, minorities, religion, belief and the right to education and committed many crimes of genocide and crimes against humanity and the abandonment of millions of citizens and the recruitment of thousands of children, which constituted a flagrant violation of human rights and international law It emphasizes the gravity of the threat to international peace and security by the organization and its associated individuals, groups, institutions and entities, including foreign terrorist fighters.

          That the legal characterization

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Bayes Estimator as a Function of Some Classical Estimator
...Show More Authors

Maximum likelihood estimation method, uniformly minimum variance unbiased estimation method and minimum mean square error estimation, as classical estimation procedures, are frequently used for parameter estimation in statistics, which assuming the parameter is constant , while Bayes method assuming the parameter is random variable and hence the Bayes estimator is an estimator which minimize the Bayes risk for each value the random observable and for square error lose function the Bayes estimator is the posterior mean. It is well known that the Bayesian estimation is hardly used as a parameter estimation technique due to some difficulties to finding a prior distribution.

The interest of this paper is that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And Research
SUBJECT: REVIEW METHODS OF DETECTING SUGAR IN A SAMPLE
...Show More Authors

Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Fault Tolerance for Real Time Distributed System
...Show More Authors

This paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.

Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.

View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Revealed of A novel Allele in Wasit – Iraqi Population
...Show More Authors

The developments in forensic DNA technology have led us to perform this study in Iraqi population as reference database of autosomal Short Tandem Repeat (aSTR) DNA markers . A total of 120 unrelated individuals from Wasit province were analyzed at 15 STR DNA markers. Allele frequencies of DNA typing loci included in the AmpFlSTR1 IdentifilerTM PCR Amplification Kit panel from Applied Biosystems (D3S1358, vWA, FGA, D8S1179, D21S11, D18S51, D5S818, D13S317, D7S820, TH01, TPOX, CSF1PO, D19S433, D2S1338, D16S539) and several forensic efficiency statistical parameters were estimated from all the sample. the combined Matching Probability (CMP) using the 15 STR genetic loci in Iraqi population was estimated at 1 in 2.08286E-18 and the Combined

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (1)
Scopus Crossref