Preferred Language
Articles
/
yRb3GocBVTCNdQwC3jeq
Deep Oxidative Desulfurization of Model fuels by Prepared Nano TiO2 with Phosphotungstic acid
...Show More Authors

In this study, nano TiO2 was prepared with titanium isopropoxide (TTIP) as a resource to titanium oxide. The catalyst was synthesized using phosphotungstic acid (PTA) and, stearyl trimethyl ammonium bromide (STAB) was used as the structure-directing material. Characterization of the product was done by the X-ray diffraction (XRD), X-ray fluorescent spectroscopy (XRF), nitrogen adsorption/desorption measurements, Atomic Force Microscope (AFM) and Fourier transform infrared (FTIR) spectra, were used to characterize the calcined TiO2 nanoparticles by STAB and PWA. The TiO2 nanomaterials were prepared in three crystalline forms (amorphous, anatase, anatase-rutile). The results showed that the nanoparticles of anatase TiO2 have good catalytic oxidative activity. This is because of the conversions of 100% within 90 sec from 300 ppm of dibenzothiophene. This is compared to conversion rates for anatase–rutile nanoparticles and amorphous nanoparticles which reached 52% and 31 %, respectively. The influence of the temperature of reaction, catalyst amount, H2O2 concentration, and initial DBT concentration on the oxidation of DBT was investigated.  

Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
US policy toward the political movement in the Arab countries Egypt a model
...Show More Authors

The whole world and the Arab world, especially an important part of this international system, is undergoing a radical transformation at all levels. This mosaic of political, economic, social and military relations and alliances, whether based on the special interests of the major Powers or on the basis of mutual interests, The major transformations to social, economic, political and military conflict and these transformations still bear more surprises, at all levels, nothing remains constant, all changed, relations changed and alliances changed and loyalties fell and the principles of the M changed and the spectacular imperial economies collapsed and the will of the masses was no longer fixed.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The cultural dimension in Turkey's foreign policy towards the South Caucasus (Model Azerbaijan)
...Show More Authors

Preserving the independence and sovereignty of the countries of the South Caucasus region, establishing political and economic stability in the region, and supporting regional cooperation are the main elements of Turkish foreign policy towards the region. The South Caucasus region, which has historical and cultural ties between it and Turkey, is a bridge that links Turkey to Central Asia.                     

     Turkey later developed advanced relations with Azerbaijan and Georgia. However, the same momentum was not achieved in terms of relations with Armenia because of the conflict over Nagorny Karabakh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Using the Input - Output Model in building the economic plan using the computer
...Show More Authors

The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
The Limitations on the Judge’s Authority in Judicial Interpretation – France as a Model
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication
Publication Date
Tue Apr 04 2023
Journal Name
Journal Of Techniques
Comparison Between the Kernel Functions Used in Estimating the Fuzzy Regression Discontinuous Model
...Show More Authors

Some experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Shift formal regulations on Mesopotamian pottery (Pottery Samarra model): محمد جاسم محمد العبيدي
...Show More Authors

Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Style ''Affirmative say'' in the holy Quran Ibn Ashour's interpretation is a model
...Show More Authors

Abstract

This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style:  ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.

Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Power System Stabilizer PSS4B Model for Iraqi National Grid using PSS/E Software
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. Double input multiband Power system stabilizers (PSSs) were used to damp out low-frequency oscillations in power system. Among dual-input PSSs, PSS4B offers superior transient performance. Power system simulator for engineering (PSS/E) software was adopted to test and evaluate the dynamic performance of PSS4B model on Iraqi national grid. The res

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref