Preferred Language
Articles
/
ijcpe-380
USING ALUMINUM REFUSE AS A COAGULANT IN THE COAGULATION AND FLIOCCULATION PROCESSES
...Show More Authors

The present work aims to study the efficiency of using aluminum refuse, which is available locally (after dissolving it in sodium hydroxide), with different coagulants like alum [Al2 (SO4)3.18H2O], Ferric chloride FeCl3 and polyaluminum chloride (PACl) to improve the quality of water. The results showed that using this coagulant in the flocculation process gave high results in the removal of turbidity as well as improving the quality of water by precipitating a great deal of ions causing hardness. From the experimental results of the Jar test, the optimum alum dosages are (25, 50 and 70 ppm), ferric chloride dosages are (15, 40 and 60 ppm) and polyaluminum chloride dosages were (10, 35 and 55 ppm) for initial water turbidity (100, 500 and 1000 NTU) respectively. While, adding sodium aluminate with the coagulants (Alum, FeCl3 and PACl), the optimum dose of 50 ppm was enough for the reduction of turbidity and hardness of water.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 16 2021
Journal Name
TÜrkÇe SÖzlÜkte Tdk Yer Alan ArapÇa Kelİmeler Üzerİne Bİr Anlam Bİlİmİ İncelemesİ
A SEMANTICS REVIEW ON THE ARABIC WORDS IN THE TURKISH DICTIONARY (TDK)
...Show More Authors

Publication Date
Sat Jan 09 2016
Journal Name
مجلة العلوم التربوية والنفسية
Hill, the Employment of a Specimen in the Teaching of Arabic Grammar
...Show More Authors

The construction process of reception containing rebuild educated new gloss within the context of real-time knowledge with previous experience and learning environment, accounting for all of the real experiences and information beside Education backbones structural climate (olive 0.2002: p. 212 .) Based on two basic principles - : I: - The natural science that we do know from our experiences, we can not say for sure Bhakaigah realism and clearly, but built by creative minds of certain interpretations be applicable in light of our expectations. Other: - The knowledge built effectively active learner who adapts new knowledge with the conceptual framework has, since everyone has a conceptual framework can break at any time and replaced by a ne

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 06 2019
Journal Name
Journal Of The College Of Education For Women
The Effect use of the Internet in Academic Libraries A Case Study
...Show More Authors

The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.

View Publication Preview PDF
Publication Date
Fri Jul 30 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
A Pragmatic Study of the Student-Teacher Relationship in the Dangerous Minds
...Show More Authors

Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The role of the strategic culture variable in negotiations (Brexit a model)
...Show More Authors

      Negotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Communications In Heat And Mass Transfer
A comparative study of twisted and straight fins in enhancing the melting and solidifying rates of PCM in horizontal double-tube heat exchangers
...Show More Authors

View Publication
Scopus (80)
Crossref (73)
Scopus Crossref
Publication Date
Tue Jan 21 2025
Journal Name
Applied Biochemistry And Biotechnology
Synthesis and characterization of new (Au, Ru, and Rh) ion complexes and evaluating their activity as anticancer and antioxidants
...Show More Authors

View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon Aug 29 2022
Journal Name
Eurasian Chem. Commun.
Removing some alizarin dyes from an aqueous solution using a polyacrylic acid hydrogel
...Show More Authors

The present work utilizes polyacrylic acid beads (PAA) to remove Alizarin yellow R (AYR)] and Alizarin Red S (ARS) from its solution. The isotherms of adsorption were investigated and the factors that impact them, such as temperature, ionic strength effect, shaking effect, and wet PAA. The isotherms of adsorption of (ARS) were found obeys the Freundlich equation. The isotherms of adsorption of (AYR) were found obeys the Langmuir equation. At various temperatures, the adsorption process on (PAA) was investigated. According to our data, there is a positive correlation between the (ARS and AYR) adsorption on the PAA and temperature (Endothermic process). The computation of the thermodynamic functions (ΔH, ΔG, and ΔS) is based on the foregoi

... Show More
Scopus (1)
Scopus