Preferred Language
Articles
/
joe-2158
Removal of Cadmium Ions from Simulated Wastewater Using Rice Husk Biosorbent
...Show More Authors

Biosorption of cadmium ions from simulated wastewater using rice husk was studied with initial concentration of 25 mg/l. Equilibrium isotherm was studied using Langmuir, Freundlich, BET and Timken models. The results show that the Freundlich isotherm is the best fit model to describe this process with high determination coefficient equals to 0.983. There was a good compliance between the experimental and theoretical results. Highest removal efficiency 97% was obtained at 2.5g of adsorbent, pH 6 and contact time 100 min.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Colloids And Surfaces B: Biointerfaces
Green synthesis of silver nanoparticles using turmeric extracts and investigation of their antibacterial activities
...Show More Authors

View Publication
Scopus (327)
Crossref (329)
Scopus Clarivate Crossref
Publication Date
Thu Nov 06 2025
Journal Name
Journal Of Physical Education
The reality of the physical education lesson in the schools of Baghdad governorate from the point of view of the applied students
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
The role of the Classroom Google Educational platform in E-learning from the viewpoint of students of the College of Basic Education
...Show More Authors

Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
Lightweight Image Compression Using Polynomial and Transform Coding
...Show More Authors

Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Directive and Steerable Radiation Pattern using SASPA Array
...Show More Authors

This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Al-nahrain University Science
Breaking Knapsack Cipher Using Population Based Incremental Learning
...Show More Authors

View Publication
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref