Preferred Language
Articles
/
zYasPIYBIXToZYALOn_I
Removal of diclofenac from aqueous solution on apricot seeds activated carbon synthesized by pyro carbonic acid microwave
...Show More Authors

Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series of experiments were conducted at constant mixing speed (300 revolutions per minute) to evaluate the effect of experimental factors likes, adsorption time, pH of diclofenac solution, diclofenac initial concentration, and dosage of activated carbon on removal efficiency. The design of experiments (version 13 Stat-Ease) was implemented using the central composite method to define the optimum effect of the process factors on the removal efficiency. The analysis of variance showed that the quadratic model for the experiment was significant with a very low probability value (P- value < 0.0001). The adjusted R2 of the model was 0.9826 and the predicted R2 was 0.9574. Whereas the optimum conditions suggested by the model for the process variable were found to be 150 min, 3.25 pH, 30 mg/L, 0.267g, for adsorption time, pH of diclofenac solution, diclofenac initial concentration, a dosage of activated carbon, respectively and the maximum removal efficiency was found to be 94.6%. The data obtained from the experiments were fitted with Langmuir and Freundlich models and the results show that the data was well fitted Langmuir model with R2 = 0.9685 as compared to the Freundlich model which has R2 = 0.93249. Likewise, the data was analyzed by pseudo first and second-order kinetic models and the results show that the adsorption on apricot-activated carbon was well adequate with the pseudo-second-order model.

Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Ni2O3 nanomaterial: Synthesis and characterization by simple chemical process
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Aesthetic Dimension in Popular Topics by Naguib Younes
...Show More Authors

The aesthetic dimension in popular subjects is one of the important topics in the history and culture of peoples, as it is the vessel from which their faith, traditions, original values, language, ideas, practices and way of life are derived, which expresses their culture and national identity, and it is the bridge of communication between generations throughout the ages.

It is one of the main pillars in the process of development and development, and popular subjects have special images related to real daily life, and they are the best source for man to narrate through him in his portrayal of daily life in general, and for the artist in particular, who is part of this daily life and its vocabulary, as he interacts with it so that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
BatchHeavy MetalsBiosorption by Punica granatum Peels: Equilibrium andKinetic Studies
...Show More Authors

This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Attention-Deficit Hyperactivity Disorder Prediction by Artificial Intelligence Techniques
...Show More Authors

Attention-Deficit Hyperactivity Disorder (ADHD), a neurodevelopmental disorder affecting millions of people globally, is defined by symptoms of hyperactivity, impulsivity, and inattention that can significantly affect an individual's daily life. The diagnostic process for ADHD is complex, requiring a combination of clinical assessments and subjective evaluations. However, recent advances in artificial intelligence (AI) techniques have shown promise in predicting ADHD and providing an early diagnosis. In this study, we will explore the application of two AI techniques, K-Nearest Neighbors (KNN) and Adaptive Boosting (AdaBoost), in predicting ADHD using the Python programming language. The classification accuracies obtained w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Inspired by poets under the Zangid and Ayyubid states
...Show More Authors

The poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)

... Show More
View Publication Preview PDF