Preferred Language
Articles
/
dhb9AIgBVTCNdQwCIHLr
An efficient Ag decorated CeO2 synergetic catalyst for improved catalytic reduction of lethal 4-nitrophenol
...Show More Authors

Catalytic reduction is considered an effective approach for the reduction of toxic organic pollutants from the environment, but finding an active catalyst is still a big challenge. Herein, Ag decorated CeO2 catalyst was synthesized through polyol reduction method and applied for catalytic reduction (conversion) of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). The Ag decorated CeO2 catalyst displayed an outstanding reduction activity with 99% conversion of 4-NP in 5 min with a 0.61 min−1 reaction rate (k). A number of structural characterization techniques were executed to investigate the influence of Ag on CeO2 and its effect on the catalytic conversion of 4-NP. The outstanding catalytic performances of the Ag-CeO2 catalyst can be assigned to strong synergistic interaction of Ag with CeO2 that prevents the aggregation of Ag species and also, helps in the exposure of more surface active metallic Ag0. In addition, the Ag-CeO2 catalyst shown remarkable durability up to several (five) repeated rounds, certifying its everyday applicability.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 03 2022
Journal Name
Rawal Medical Journal
Functional outcome of closed reduction of supracondylar humerus fracture with cross Kirschner wire in children
...Show More Authors

Objective: To evaluate the functional outcome of percutaneous cross two K wires fixation for Gartland types II and III fractures of humerus. Methodology: This prospective study included80 patients with supracondylar humeral fracture, who underwent closed reduction and fixation by two crossed Kirschner wires. We included children with age < 15 years with closed fractures with Gartland types II and III, while the patient with vascular injury, open, irreducible fractures were excluded. The patients were following up for 6 months and assessed functionally by Flynn’s criteria. Results: The mean age of patients was 8.1 years. Trauma while child playing was the main mechanism of injury in 43 (59.8%) children and 46 (57.5%) fractures were of the

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Impact of Ozone Used-Alone and Coagulation Aid Treatment on The Reduction of Trihalomethanes Components
...Show More Authors

The whole research paper examines the impact of ozone as either a just use-alone and coagulation benefit, mainly upon the reduction of dissolved organic carbon from the water with a moderate rate of DOC 10.75 mg/land CaCO3 calcium hardness 300 mg/l. A raw water sample has been taken from the Tigris River (Baghdad, Iraq) was being adopted in research work. The performance of ozone therapy has been assessed by calculations of DOC, DOC quantities, UV254, as well as total trihalomethane (TTHM). Research findings have shown that with 0.9 mg O3/mg DOC ozone use-alone, approximately 60% UV254 reduction and approximately 28% DOC reduction will occur.DOC fractionation analysis indicates that within the water samples, ozone could alter the co

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 23 2015
Journal Name
Transactions On Engineering And Sciences
Glycine Poly Acrylate with 4-Aminoantipyrine
...Show More Authors

Transactions on Engineering and Sciences

Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Promising Gains of 5G Networks with Enhancing Energy Efficiency Using Improved Linear Precoding Schemes
...Show More Authors

Scopus (2)
Scopus Crossref
Publication Date
Mon Apr 10 2023
Journal Name
The European Physical Journal Plus
Improved performance of D149 dye-sensitized ZnO-based solar cell under solvents activation effect
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Energy Storage
Improved melting of latent heat storage via porous medium and uniform Joule heat generation
...Show More Authors

View Publication
Scopus (57)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Synthesis of new Polyimides Derived from 4- minoantipyrine
...Show More Authors

In the present study, new five polymers of acryloyl chloride have been synthesized by reaction 4-aminoantipyrine with many substituted acid chloride (A-E). Then condensation of polyacryloyl chloride with the product in one step (A-E), in a suitable solvent in the presence amount of (Et3N) to obtain new polyimides(A1-E5). The prepared compounds were characterized by UV. FT-IR, 1H-NMR and 13C-NMR spectroscopy and measuring of other physical properties such as softening point, melting point and solublities.

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Synthesis and Spectroscopic Studies of some Divalent Metall Ion Complexes of 3-(4-hydroxyphenyl)-2-(3-(4-nitrobenzoyl) thioureido) propanoic acid
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref