Preferred Language
Articles
/
yhZgfowBVTCNdQwCiPwS
Adsorption of Ciprofloxacin Hydrochloride from Aqueous Solution by Iraqi Porcelinaite Adsorbent
...Show More Authors

Pharmaceuticals are widely distributed in different applications and also released into the environment. Adsorption of Ciprofloxacin HCl (CIPH) on Porcelinaite was studied at ambient conditions. The adsorption isotherms can be well described using the Freundlich and Temkin equations. The pH of the solution influences significantly the adsorption capacity of Porcelinaite, the adsorption of CIPH increased from the initial pH 1.3 and then decreased over the pH rang of 3.8-9. The adsorption is sensitive to the change in ionic Strength, which indicate that electrostatic attraction is a significant mechanism for sorption process. The enthalpy change (ΔH) for the adsorption of CIPH onto Porcelinaite signifies an endothermic adsorption. The ΔG value is negative at all studied temperatures, inferring that, the adsorption of CIPH onto porcelinaite will follow a spontaneous trend. The ΔG value decreased when the temperature increased from 15 oC to 37.5 oC, suggesting increase in adsorption of CIPH with increasing temperature. The positive value of ΔS reflects the affinity of porcelinaite towards drug and also suggests increased randomness at the solid-solution interface.

Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Carwash Wastewater Treatment by Electrocoagulation Using Aluminum Foil Electrodes
...Show More Authors

Large quantities of contaminated carwash wastewater are produced per day from carwash places. Extensively it contains large quantities of chemicals from detergents, oil, grease, heavy metals, suspended solids, types of hydrocarbons, and biological contents. A novel electrocoagulation treatment by foil electrodes was conducted to remove COD, turbidity, Total Dissolved Solids (TDS) from contaminated carwash wastewater and decrease its Electrical Conductivity (EC). A thin layer of aluminum foil is used as an electrode in this treatment process. The effects of different voltage and treatment times were studied. The best result was found at a voltage of 30 volts and treatment time 90 minute where the removal efficiency of COD

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Synthesized copper nanoparticles by sonoelectrodeposition for gas filter applications
...Show More Authors

Copper nanoparticles (CuNPs) were prepared with different diameters by sonoelectrodeposition technique using Electrodeposition process coupled with high-power ultrasound horn (Sonoelectrodeposition). The particle diameter of the CuNPs was adjusted by varying CuSO4 solution acidity (pH) and current density. The morphology and structure of the CuNPs were examined by X-ray diffraction (XRD) and Scanning Electron Microscopy (SEM). It was found that the size of the produced copper nanoparticles ranged between 22 to 77 nm, where the diameter of CuNPs increases with reduction the solution acidity from 0.5 to 1.5 pH and increasing the current density of the deposition from 100 to 400 nm. Finally the produced CuNPs were pressed to fabricate disc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Reducing the Water Hardness by Using Electromagnetic Polarization Method
...Show More Authors

Hard water does not pose a threat to human health but may cause precipitation of soap or results stone in the boilers. These reactions are caused by the high concentrations of Ca and Mg. In the industry they are undesirable because of higher fuel consumption for industrial use .Electromagnetic polarization water treatment is a method which can be used for increasing the precipitation of Ca 2+ and CO3 2- ions in hard water to form CaCO3 which leads to decrease the water hardness is research has been conducted by changing the number of coil turns and voltage of the system. The spectroscopy electron microscope was used for imaging the produced crystals. Results of the investigation indicated that

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Al- Mustansiriyah Journal Science
Convex Approximation by q- Meyer-König-Zeller Durrmeyer Operators
...Show More Authors

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Plasmid role in agar utilization by Pseudomonas sp. HK1
...Show More Authors

Forty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes

... Show More
View Publication Preview PDF