Preferred Language
Articles
/
zYasPIYBIXToZYALOn_I
Removal of diclofenac from aqueous solution on apricot seeds activated carbon synthesized by pyro carbonic acid microwave
...Show More Authors

Pharmaceuticals have been widely remaining contaminants in wastewater, and diclofenac is the most common pharmaceutical pollutant. Therefore, the removal of diclofenac from aqueous solutions using activated carbon produced by pyrocarbonic acid and microwaves was investigated in this research. Apricot seed powder and pyrophosphoric acid (45 wt%) were selected as raw material and activator respectively, and microwave irradiation technique was used to prepare the activated carbon. The raw material was impregnated in pyrophosphoric acid at 80◦C with an impregnation ratio of 1: 3 (apricot seeds to phosphoric acid), the impregnation time was 4 h, whereas the power of the microwave was 700 watts with a radiation time of 20 min. A series of experiments were conducted at constant mixing speed (300 revolutions per minute) to evaluate the effect of experimental factors likes, adsorption time, pH of diclofenac solution, diclofenac initial concentration, and dosage of activated carbon on removal efficiency. The design of experiments (version 13 Stat-Ease) was implemented using the central composite method to define the optimum effect of the process factors on the removal efficiency. The analysis of variance showed that the quadratic model for the experiment was significant with a very low probability value (P- value < 0.0001). The adjusted R2 of the model was 0.9826 and the predicted R2 was 0.9574. Whereas the optimum conditions suggested by the model for the process variable were found to be 150 min, 3.25 pH, 30 mg/L, 0.267g, for adsorption time, pH of diclofenac solution, diclofenac initial concentration, a dosage of activated carbon, respectively and the maximum removal efficiency was found to be 94.6%. The data obtained from the experiments were fitted with Langmuir and Freundlich models and the results show that the data was well fitted Langmuir model with R2 = 0.9685 as compared to the Freundlich model which has R2 = 0.93249. Likewise, the data was analyzed by pseudo first and second-order kinetic models and the results show that the adsorption on apricot-activated carbon was well adequate with the pseudo-second-order model.

Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

         This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material,  and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 31 2018
Journal Name
Pharmacy Practice
Scholarly publishing depends on peer reviewers
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Class and its impact on society
...Show More Authors

Man has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 19 2026
Journal Name
Al–bahith Al–a'alami
Adopting the public on satellite channels
...Show More Authors

The importance of television has emerged as an effective and influential force in the lives of societies and peoples, And not just a professional media since the fifties of the twentieth century, It was used as a platform to achieve the goals and objectives of the media and politics for governments, agencies and individuals in different countries of the world, Using many methods, methods and techniques that later became important major subjects and curricula and a scientific specialization that was founded for him to study and teach in most international universities, The media, especially television and satellite channels, play an active and significant role in managing crises and conflicts and directing them through the methods of deal

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Some New Results on Lucky Labeling
...Show More Authors

Czerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if  for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Arab Women’s Self-Performance on Instagram
...Show More Authors

This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the r

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Study on Safety Construction Management Plan
...Show More Authors

After studying the reality of application to occupational safety in new Iraqi building projects and sampling the situation wilt that in developed and neighboring countries, researcher found that there is a big gap in the level of safety application conditions, this indicates the need fora quick and clear reference for local engineers to use it on site for safety conditions in their projects . As a case study the monitors work the researcher studied a huge project in the United Arab Emirates.This project considered for safety requirements to highest grades. This case study may be far away from the projects in Iraq, but we hope to rise the Iraqi work level in the near future. After seeing the way of administration work and how they were ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref