Preferred Language
Articles
/
Jxe3DZABVTCNdQwCp4OF
Application of Taguchi orthogonal array in optimization of the synthesis and crystallinity of metal organic framework 5 (MOF 5)
...Show More Authors

Purpose: To use the L25 Taguchi orthogonal array for optimizing the three main solvothermal parameters that affect the synthesis of metal-organic frameworks-5 (MOF-5). Methods: The L25 Taguchi methodology was used to study various parameters that affect the degree of crystallinity (DOC) of MOF-5. The parameters comprised temperature of synthesis, duration of synthesis, and ratio of the solvent, N,N-dimethyl formamide (DMF) to reactants. For each parameter, the volume of DMF was varied while keeping the weight of reactants constant. The weights of 1,4-benzodicarboxylate (BDC) and Zn(NO3)2.6H2O used were 0.390 g and 2.166 g, respectively. For each parameter investigated, five different levels were used. The MOF-5 samples were synthesized using the solvothermal reaction method, and successful synthesis was confirmed with x-ray diffraction (XRD), microscopy, Fourier transform infrared spectroscopy (FTIR) and energy-dispersive x-ray spectroscopy (EDS). The DOC obtained via XRD served as a parameter of objective quality. Results: The optimum conditions that gave the highest DOC were synthesis temperature of 130 °C, duration of 60 h, and a vehicle volume of 50 mL, with optimum Brunauer-Emmett-Teller surface area (BET -SA) of 800 m2/g. All the three synthesis parameters significantly influenced the DOC of the synthesized MOF-5 (p < 0.05). Sub-optimal conditions resulted in distorted MOFs, products that deviated from MOF-5 specifications, or MOF-5 with low DOC. Conclusion: Based on DOC and BET-SA, the best conditions for synthesis of MOF-5 when using Taguchi OA, were temperature of 130 °C, duration of 60 h, and a DMF volume of 50 mL.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
Campos En Ciencias Sociales
Leadership and Post-Conflict State Rebuilding: Iraq after 2003 Case Study
...Show More Authors

The Iraqi political and social arena has been characterized, subjectively and objectively, by the weakness of leadership building. This has led to a leadership crisis, which is reflected in the quality of the outcome of the process of rebuilding the state in Iraq. Thus, this building process has lacked the simplest requirements and conditions of success. It has suffered from a major and obvious failure: the situation in Iraq has raised conflict leaders, not constructive leaders, and this confirms the existence of a cultural crisis in the production of conscious, aware leadership compatible with democratic action. The weakness of leadership in Iraq is reflected in a series of ongoing crises that require radical solutions in accordance with l

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DYE REMOVAL FROM TEXTILE WASTEWATER BY COAGULATION USING ALUM AND PAC
...Show More Authors

Removal of solar brown and direct black dyes by coagulation with two aluminum based
coagulants was conducted. The main objective is to examine the efficiency of these
coagulants in the treatment of dye polluted water discharged from Al-Kadhymia Textile
Company (Baghdad-Iraq). The performance of these coagulants was investigated through
jar test by comparing dye percent removal at different wastewater pH, coagulant dose,
and initial dye concentration. Results show that alum works better than PAC under acidic
media (5-6) and PAC works better under basic media (7-8) in the removal of both solar
brown and direct black dyes. Higher doses of PAC were required to achieve the
maximum removal efficiency under optimum pH co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 14 2017
Journal Name
Oriental Journal Of Chemistry
Leucine Aminopeptidase from Arachis hypogaea L. Seeds Partial Purification and Characterization
...Show More Authors

Leucine amino peptidases (LAP; EC 3.4.11.1) constitute a diverse set of exopeptidases that catalyze the hydrolysis of leucine residues from the amino-terminal of protein or peptide substrates, (LAP) are present in animals, plants, and microbes. In this study, leucine amino peptidase was purified partial from Arachis hypogaea seeds by using gel filtration chromatography Sephadex G-100. The enzyme was purified 3.965 fold with a recovery of 29.4%. Its pH and temperature optimum were(8.7) and (37oC), respectively. The results show novel properties of LAP from Arachis hypogaea L. or peanut. The Km value for LAP (77 mM), with V max (1538 m mole min-1). We recommend a separate isoenzymeof the enzyme (LAP) from Arachis hypogaea on L. peanut seeds a

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Eyes Drugs and Treatment at Ibn al –Haytham: A Historical Study
...Show More Authors

            Ibn al-Haytham is the pioneer of optics, which is a science that had described optics circumstances. Optics or landscape science as it was known by the Arab and Muslim scientists at the time when  is a science known as the conditions of sighters in their quantity and quality as the proximity and distance from the beholder , the different forms , conditions and what mediate between the beholder and the microscopes , to explain useful knowledge of what obscures the sight of the conditions of sighters and is used to measure the space Distant criminality and  mirrors.

Ibn al-Haitham wrote his famous book The Book of Mirrors and studied mistakes adopted the m

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Financial education, political instability and firm performance: Evidence from Malaysian SMEs
...Show More Authors

This study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b

... Show More
Scopus (2)
Scopus
Publication Date
Sat Mar 01 2025
Journal Name
Coed
Engaging High School Teachers with Artificial Intelligence Concepts, Applications, and Developments
...Show More Authors

This work analyzes the effectiveness of an artificial intelligence (AI) community- building workshop designed for high school teachers and it focuses on contemporary issues related to AI concepts and applications. A group of high school teachers from local education districts attended a one-day AI hands-on workshop at our university. The workshop included several AI-related topics and hands-on examples and exercises aiming to introduce AI concepts and tools relevant to pre-college education. The participating teachers were expected to become a part of a collaborative network created to design, develop, and implement novel AI learning modules for high school students. Initial and a post-training surveys have been used to measure the

... Show More
View Publication
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Proceedings Of The 5th International Conference On Communications And Broadband Networking
Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation
...Show More Authors

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref