Preferred Language
Articles
/
uRbBU4cBVTCNdQwCc0U4
Optimization of dye adsorption process for Albizia lebbeck pods as a biomass using central composite rotatable design model
...Show More Authors

Albizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal efficiency was found to increase with the increase in methyl red concentration and decrease the adsorption time at constant adsorbent weight.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 11 2024
Journal Name
Tropical Journal Of Pharmaceutical Research
Application of Taguchi orthogonal array in optimization of the synthesis and crystallinity of metal organic framework 5 (MOF 5)
...Show More Authors

Purpose: To use the L25 Taguchi orthogonal array for optimizing the three main solvothermal parameters that affect the synthesis of metal-organic frameworks-5 (MOF-5). Methods: The L25 Taguchi methodology was used to study various parameters that affect the degree of crystallinity (DOC) of MOF-5. The parameters comprised temperature of synthesis, duration of synthesis, and ratio of the solvent, N,N-dimethyl formamide (DMF) to reactants. For each parameter, the volume of DMF was varied while keeping the weight of reactants constant. The weights of 1,4-benzodicarboxylate (BDC) and Zn(NO3)2.6H2O used were 0.390 g and 2.166 g, respectively. For each parameter investigated, five different levels were used. The MOF-5 samples were synthesi

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon May 19 2025
Journal Name
Retos
The effect of the cube model on visual-spatial intelligence and learning the skill of spiking in volleyball for female students
...Show More Authors

Objective: To identify the effect of the cube model on visual-spatial intelligence and learning the skill of spikinging in volleyball for female students, The researchers used the experimental method by designing two equivalent groups with pre- and post-measurements. Research methodology: The main research sample of (30) female students was selected from the research community represented by second-stage students in the College of Physical Education and Sports Sciences - University of Baghdad for the academic year (2024-2025). The sample was divided equally into two control and experimental groups. The researchers conducted the sample homogenization process and the equivalence process between the two groups in the variables of visua

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 02 2024
Journal Name
Kurdish Studies
The Impact of the Brain Consensus Model on the Acquisition of Arabic Grammar Concepts for Female Students in the Fourth Grade
...Show More Authors

Objectives: To identify the impact of the brain consensus model on the acquisition of Arabic grammar concepts among students in the fourth grade, methodology: The pilot curriculum was used, and a partial control pilot design was adopted. There were 30 female students in the pilot group, 30 female students in the control group, and the two researchers were statistically rewarded among the two groups' students in some variables and used appropriate statistical means to analyse the results, including the test for two independent samples, the square (c2) and the Alpha Kronbach equation.Results: The pilot group outperformed the control group. The results showed that there is a significant statistical difference at the indicative level (0.05) for

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Fractal Image Compression Using Block Indexing Technique: A Review
...Show More Authors

Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref