Preferred Language
Articles
/
ijcpe-828
Removal of Vanadium and Nickel Ions from Iraqi Atmospheric Residue by Using Solvent Extraction Method
...Show More Authors

Iraqi crude Atmospheric residual fraction supplied from al-Dura refinery was treated to remove metals contaminants by solvent extraction method, with various hydrocarbon solvents and concentrations. The extraction method using three different type solvent (n-hexane, n-heptane, and light naphtha) were found to be effective for removal of oil-soluble metals from heavy atmospheric residual fraction. Different solvents with using three different hydrocarbon solvents (n-hexane, n-heptane, and light naphtha) .different variables were studied solvent/oil ratios (4/1, 8/1, 10/1, 12/1, and 15/1), different intervals of perceptual (15, 30-60, 90 and 120 min) and different temperature (30, 45, 60 and 90 °C) were used. The metals removal percent were found depending on the yield of asphaltene. The solvent-oil ratio had important effects on the amount of metal removal. The metals removal was increased at increasing temperatures from 30 to 90 0C increases the metal ion precipitated. The highest Ni precipitated was 79.23 ppm using heptane at 90 0C while for V the highest value was 64.51 ppm using also heptane at 90 0C, while the mixing time decreased metals removal. With increasing asphalt yield, the removal of metal was more selective. Among the solvents used in the extraction treatment method, the highest Ni precipitated was 76 ppm using hexane at 150 ml solvent and showed the most promising results. Increasing mixing time increases metals removal for V, the highest value was 65.51 ppm using either heptane or light naphtha.

   The highest Ni precipitated was 78 ppm using heptane at 120 min while for V the highest value was 67 ppm using either heptane or light naphtha after 120 min.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Chemistry And Materials Research
Simple RP-HPLC Method for Estimation of Furosemide, Carbamazepine, Diazepam and Carvedilol in Bulk and Pharmaceutical Dosage Forms
...Show More Authors

A simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and li

... Show More
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS AND CHARACTERIZATION OF NEW DEMULSIFIER FROM NATURAL AND SYNTHETIC POLYMER: SYNTHESIS AND CHARACTERIZATION OF NEW DEMULSIFIER FROM NATURAL AND SYNTHETIC POLYMER
...Show More Authors

ABSTRACT

This research included the preparation and characterization of new demulsifies from natural and synthetic polymers of chitosan and polyvinyl alcohol that are environmentally friendly and at the same time have high efficacy comparable to emulsifiers. imported foreign. The prepared compounds were examined using infrared spectroscopy and nuclear magnetic resonance spectroscopy, and all the spectral signals of the polymers were in good agreement with the chemical composition of the polymers. And the melting and decomposition that occur on polymers at high temperatures. The effect of the length and type of side chain in the compositions of polymers on the process of water separation of oil emulsions w

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Effect of Chloride Ions on the Corrosion Behavior of Al – Zn Alloy in NaOH Solution at Four Different Temperatures
...Show More Authors

This research involves study effect of chloride ions in concentration range (0.01 – 0.50 mol.dm-3) on the corrosion behavior of Al-Zn alloy in basic media of 1x10-3 mol.dm-3 NaOH at pH=11 and four different temperatures in the range (298-313 K). Cathodic and anodic Tafel slopes (bc &ba) and transfer coefficients (αc & αa) were calculated and the results interprets according to the variation of the rate – determining steps. The results also indicate that the chloride ions are bonded chemically in the interface as an initial step of formation of different mixed oxohydroxy – and chloro complexes. Polarization resistance (Rp) is calculates

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 19 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study of the impact of foreign direct investment in the Iraqi tax system using the factorial analysis: (principal components)
...Show More Authors

The tax system, like any other system, as a set of elements and parts that complement each other and are interrelated and interact to achieve specific goals, and is a natural  reflection of the economic, social and political conditions prevailing in society, and therefore the objectives of tax policy formulated in line with the objectives of economic policy in general, which means that any change in economic policy clearly affects fiscal policy measures and fiscal policy in particular.

The problem of searching for the impact of foreign direct investment in the Iraqi tax system was focused on the study  the of foreign direct investment and therole played in developing and improving the economic reality and its implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
Journalistic Treatment of Violations of Iraqi Women’s Rights: An Analytical Study of Al-Sabah Newspaper from 1st July 2021 to 31st December 2021
...Show More Authors

This research examines how Al-Sabah newspaper addressed violations of women’s rights in Iraq. Using content analysis, a sample of 157 articles published from July 1, 2021, to December 31, 2021, was analyzed. The study reveals diverse journalistic treatments, with interpretive approaches employed in addressing violations of Iraqi women’s rights. Social violations of women’s rights were the primary focus, and various forms of newspaper articles, including opinion pieces, were commonly used.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 12 2023
Journal Name
Agbioforum
Assessing the Impacts of Consumer Awareness on Consumer Purchase Intention with Moderating Role of Product Label: Evidence from Consumers of Iraqi Manufacturing Firms
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication