Preferred Language
Articles
/
bsj-5385
Using some Natural Minerals to Remove Cadmium from Polluted Water
...Show More Authors

Water scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research work to use some natural minerals as zeolite, bentonite and montmorillonite to adsorb cadmium element from polluted water. Various concentrations of cadmium in solutions 10, 30 and 50 ppm were treated with three different ratios of each mineral; 1, 3 and 5% (W/V). The obtained results proved that increasing the ratio of amendments to 5% increased Cd adsorption from solution particularly at 50ppm Cd. Zeolite obtained the highest ratio of adsorption (47.90 ppm), followed by montmorillonite (44.99 ppm) and the lowest was bentonite (38.97 ppm). Therefore, it can be recommended that addition of zeolite is the most favorable material to remove Cd element from polluted water.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The smart phones and its relationship with some variables among middle school students
...Show More Authors

             The study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones h

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Journal Of Engineering
Assessment of Electromagnetic Pollution in Some Hospitals and Schools in Al-Najaf City
...Show More Authors

The tremendous benefits of using cellular phones, which began to increase and unprecedented spread worldwide last decade, were accompanied by harmful effects on the environment due to the increase in electromagnetic radiation (EMR) which be emitted from mobile phone towers. This effect on humans, animals, and plants, which is considered a form of environmental pollution, was sensed by developed countries and Environmental protection organizations. These countries have established restrictions and enacted laws to reduce their negative impact on living beings. The field survey included six major hospitals and 38 schools were distributed over the central neighbourhoods in Al-Najaf city. The results showed that power density (PD) measurement

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Plant Archives
Association between BTN1A1 gene polymorphism and some reproductive efficiency indicator and heat toleranceinholsteincows
...Show More Authors

This study was conducted in Al-Salam station for Dairy cattle/private sector, for the period from 1-11-2016 to 1-11-2017, to determine the association between BTN1A1 gene polymorphism and reproductive efficiency indicator and heat tolerance in 50 Holstein cows. The results of BTN1A1 gene analysis showed a highly significant Different (P<0.01) between genotypes of BTN1A1 gene’s genotypes AA, AB the percentage were 72.00, 28.00 % respectively. Results showed that services per conception and days open was significantly (P<0.05) affected by polymorphism of BTN1A1 gene and for cows with AA genotype, there was also a significant difference (P<0.05) between the genotypes of BTN1A1 gene for IgG concentration in calves blood who belong to mother

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
The study of antibacterial activity of some plant extracts against causes of pneumonia
...Show More Authors

Eighty five samples were taken from patients suffering from pneumonia. Seventy-eight isolates were diagnosed as following: Staphylococcus aureus (23), klebsiella pneumoniae (29), Streptococcus pneumoniae (15), Serratia sp. (4), Haemophilus influenzae (4) and Pseudomonas aeruginosa (3). The clinical isolates were tested for antibiotics sensitivity. They appeared highly resistance to penicillin G and Ampicillin at percentage 89.7 and 84.6% respectly while the results showed highly sensitivity to streptomycin at percentege of (12.8%). To study the antibacterial activity of Alium sativum, Eucalyptus microtheca leaves and Cydonia oblonga seeds extracts, five multi resistant strains were used by using agar well diffusion and disk methods at c

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 12 2023
Journal Name
Egyptian Journal Of Biological Pest Control
Evaluation of the effectiveness of some mycorrhizal fungi isolates against charcoal rot disease
...Show More Authors
Abstract<sec> <title>Background

The sunflower plants are attacked by serious seed and soil-borne pathogens including charcoal rot disease that caused by Macrophomina phaseolina. This disease has serious damages to sunflower crop. This study aimed to assess the efficacy of Arbuscular mycorrhizal fungus against charcoal rot disease as fungicide alternative.

Results

Morphological and molecular identification was done, using universal primers for molecular identification. Finally, a greenhouse experiment was conducted, and

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 27 2022
Journal Name
2022 3rd Information Technology To Enhance E-learning And Other Application (it-ela)
Diabetes Prediction Using Machine Learning
...Show More Authors

Diabetes is one of the increasing chronic diseases, affecting millions of people around the earth. Diabetes diagnosis, its prediction, proper cure, and management are compulsory. Machine learning-based prediction techniques for diabetes data analysis can help in the early detection and prediction of the disease and its consequences such as hypo/hyperglycemia. In this paper, we explored the diabetes dataset collected from the medical records of one thousand Iraqi patients. We applied three classifiers, the multilayer perceptron, the KNN and the Random Forest. We involved two experiments: the first experiment used all 12 features of the dataset. The Random Forest outperforms others with 98.8% accuracy. The second experiment used only five att

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Ssrn Electronic Journal
Sustainable ENERGY by using AI
...Show More Authors

As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,

... Show More
View Publication
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF