Preferred Language
Articles
/
Exa5IocBVTCNdQwCdDoL
Performance Evaluation of the Organic Matter Removal Efficiency in Wastewater Treatment Plants; Case study Al- Diwaniyah WWTP in Iraq
...Show More Authors

This study aims to assess the removal efficiency andestablish the BOD5 and COD statisticalcorrelation of the sewage flowing in Al-Diwaniyah wastewater treatment plant in Iraq during the study period (2005-2016). The strength of the influent wastewater entering the plant varied from medium to high in strength. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate evaluation of liquid waste and optimal control process. The equations relating the percentage removal of BOD5(y) with influent BOD5(x), y= 0.044x + 80.66 and the percentage removal of COD (y) with influent COD (x), y= 0.045x + 55.15 were found with high correlation R2 =0.72 and 0.86 respectively.

Publication Date
Thu Nov 27 2025
Journal Name
Frontiers In Robotics And Ai
Design of modified fractional-order PID controller for lower limb rehabilitation exoskeleton robot based on an improved elk herd hybridized with grey wolf and multi-verse optimization algorithms
...Show More Authors

Rehabilitation robots are widely recognized as vital for restoring motor function in patients with lower-limb impairments. A Modified Fractional-Order Proportional-Integral-Derivative (MFOPID) controller is proposed to improve trajectory tracking of a 2-DoF Lower Limb Rehabilitation Exoskeleton Robot (LLRER). The classical FOPID is augmented with a modified control formulation by which steady-state error is reduced and the transient response is sharpened. Controller gains and fractional orders were tuned offline using a hybrid metaheuristic Improved Elk Herd Optimization hybridized with Grey Wolf and Multi-Verse Optimization algorithms (IElk-GM) so that exploration and exploitation are balanced. Superiority over the classical FOPID

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Sep 20 2024
Journal Name
Journal Of Nano Research
Impact of Copper Doping on Nanocrystalline SnO<sub>2</sub> Thin Films Synthesized by Sol-Gel Coating and Chemical Bath Deposition for Gas Sensor Applications
...Show More Authors

This work focuses on the preparation of pure nanocrystalline SnO2 and SnO2:Cu thin films on cleaned glass substrates utilizing a sol-gel spin coating and chemical bath deposition (CBD) procedures. The primary aim of this study is to investigate the possible use of these thin films in the context of gas sensor applications. The films underwent annealing in an air environment at a temperature of 500 C for duration of 60 minutes. The thickness of the film that was deposited may be estimated to be around 300 nm. The investigation included an examination of the structural, optical, electrical, and sensing characteristics, which were explored across various preparation circumstances, specifically focusing on varied

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Nasaq
Types and functions of comparisons (based on Russian and Arabic phraseological units) Типы и функции сравнений (на материале русских и арабских фразеологизмов) انواع ووظائف المقارنات )في االمثال الروسية والعربية
...Show More Authors

Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russia

... Show More
Publication Date
Tue Jun 05 2018
Journal Name
Journal Of Molecular Structure
Synthesis, characterization, experimental and theoretical structure of novel Dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-ylkN3] pyridine-kN})metal(II) compounds, metal ¼ Mn, Co and Ni
...Show More Authors

The syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =

... Show More
Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Advances In Physics Theories And Applications
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II), Cobalt(II), Iron (II), Nickel (II) , zinc (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid(L-Valine) And Saccharin
...Show More Authors

new six mixed ligand complexes of some transition metal ions Manganese (II), Cobalt(II), Iron (II), Nickel (II) , and non transition metal ion zinc (II) And Cadmium(II) with L-valine (Val H ) as a primary ligand and Saccharin (HSac) as a secondary ligands have been prepared. All the prepared complexes have been characterized by molar conductance, magnetic susceptibility infrared, electronic spectral, Elemental microanalysis (C.H.N) and AA . The complexes with the formulas [M(Val)2(HSac)2] M= Mn (II) , Fe (II) , Co(II) ,Ni(II), Cu (II),Zn(II) and Cd(II) L- Val H= (C5H11NO2) , C7H5NO3S The study shows that these complexes have octahedral geometry; The metal complexes have been screened for their in microbiological activities against bacteria.

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Novel Methyl 2-(1,7,7-Tri methylbicyclo[2.2.1]hept-2-yieldene)hydrazinecarbodithioate Schiff Bases Derived From Methylhydrazine carbodithioate And Their Bi(III) And Ag(II) Complexes
...Show More Authors

Novel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref