Preferred Language
Articles
/
zYasPIYBIXToZYALOn_I
Removal of diclofenac from aqueous solution on apricot seeds activated carbon synthesized by pyro carbonic acid microwave
...Show More Authors

Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series of experiments were conducted at constant mixing speed (300 revolutions per minute) to evaluate the effect of experimental factors likes, adsorption time, pH of diclofenac solution, diclofenac initial concentration, and dosage of activated carbon on removal efficiency. The design of experiments (version 13 Stat-Ease) was implemented using the central composite method to define the optimum effect of the process factors on the removal efficiency. The analysis of variance showed that the quadratic model for the experiment was significant with a very low probability value (P- value < 0.0001). The adjusted R2 of the model was 0.9826 and the predicted R2 was 0.9574. Whereas the optimum conditions suggested by the model for the process variable were found to be 150 min, 3.25 pH, 30 mg/L, 0.267g, for adsorption time, pH of diclofenac solution, diclofenac initial concentration, a dosage of activated carbon, respectively and the maximum removal efficiency was found to be 94.6%. The data obtained from the experiments were fitted with Langmuir and Freundlich models and the results show that the data was well fitted Langmuir model with R2 = 0.9685 as compared to the Freundlich model which has R2 = 0.93249. Likewise, the data was analyzed by pseudo first and second-order kinetic models and the results show that the adsorption on apricot-activated carbon was well adequate with the pseudo-second-order model.

Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers &amp; Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (25)
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Suggested Index for studying violent by Environment and Psychology components among Collegian students at a sample in Baghdad City
...Show More Authors

Objective: To identification environmental and psychological violence's components among collegians’ students of different stages, and gender throughout creating specific questionnaire, and estimating regression of environmental domain effect on psychological domain, as well as measuring powerful of the association contingency between violence's domains in admixed form with respondent characteristics, such that (Demographics, Economics, and Behaviors), and extracting model of estimates impact of studied domains in studying risks, and protective factors among collegians’ students in Baghdad city. Methodolog

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Between Shrinkage &Maximum likelihood Method For Estimation Parameters &Reliability Function With 3- Parameter Weibull Distribution By Using Simulation
...Show More Authors

The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .

In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.

Note:- ns : small sample ; nm=median sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Big data analysis by using one covariate at a time multiple testing (Ocmt) method: Early school dropout in iraq
...Show More Authors

Scopus (7)
Scopus
Publication Date
Fri Mar 01 2019
Journal Name
Al-nahrain Journal Of Science
Effect of Active Galactic Nuclei (AGN) on the Photometric and Morphologic Properties of NGC 4414 and NGC 4369 Spiral Galaxies
...Show More Authors

The purpose of this work is to clarify the effect of the Active Galactic Nucleus (AGN) on the properties of the galaxy. A photometric study of two galaxies by surface optical measurements techniques and by using'griz filters' was performed. The scientific material that used in this work was obtained from ''SLOAN DIGITAL SKY SURVEY'' (DR7), a fuzzy color, contour maps, photometric parameters, and color indices were studied by using surface photometric technique. The work was done by Ellipse task in IRAF (Image Reduction and Analysis Facility) software from the National Optical Astronomy Observatory (NOAO).

View Publication
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed May 09 2012
Journal Name
Fuzzy Inference System - Theory And Applications
Some Studies on Noise and Its Effects on Industrial/Cognitive Task Performance and Modeling
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref