Preferred Language
Articles
/
joe-2259
Boron Removal by Adsorption onto Different Oxides
...Show More Authors

A research was conducted to determine the feasibility of using adsorption process to remove boron from aqueous solutions using batch technique. Three adsorbent materials; magnesium, aluminum and iron oxide were investigated to find their abilities for boron removal. The effects of operational parameters on boron removal efficiency for each material were determined.
The experimental results revealed that maximum boron removal was achieved at pH 9.5 for magnesium oxide and 8 for aluminum and iron oxide. The percentage of boron adsorbed onto magnesium,aluminum and iron oxide reaches up to 90, 42.5 and 41.5% respectively under appropriate conditions. Boron concentration in effluent water after adsorption via magnesium oxide comply with the allowable
concentration according to WHO and the Iraqi drinking water guidelines, i.e. below 0.5 mg/l. Aluminum and iron oxide yield effluent water with boron concentration more than allowable limits. Accordingly,magnesium oxide is more suitable as adsorbent for boron removal from water; for its high adsorbent capacity and high removal ability for boron compared with aluminum and iron oxide.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Colloid And Interface Science
Wettability alteration of oil-wet carbonate by silica nanofluid
...Show More Authors

Changing oil-wet surfaces toward higher water wettability is of key importance in subsurface engineering applications. This includes petroleum recovery from fractured limestone reservoirs, which are typically mixed or oil-wet, resulting in poor productivity as conventional waterflooding techniques are inefficient. A wettability change toward more water-wet would significantly improve oil displacement efficiency, and thus productivity. Another area where such a wettability shift would be highly beneficial is carbon geo-sequestration, where compressed CO2 is pumped underground for storage. It has recently been identified that more water-wet formations can store more CO2. We thus examined how silica based nanofluids can induce such a wettabil

... Show More
View Publication Preview PDF
Crossref (368)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Enhanced efficiency of CdTe Photovoltaic by thermal evaporation Vacuum
...Show More Authors

Crossref (21)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Improvement of Diesel Fuel Engine Performance by Nanoparticles Additives
...Show More Authors

This study was done to investigate the impact of different nanoparticles on diesel fuel characteristics, Iraqi diesel fuel was supplied from al-Dura refinery and was treated to enhance performance by improving its characteristics. Two types of nanoparticles were mixed with Iraqi diesel fuel at various weight fractions of 30, 60, 90, and 120 ppm. The diesel engine was tested and run at a constant speed of 1600 rpm to examine and evaluate the engine's performance and determine emissions. In general, ZnO additives' performance analysis showed they are more efficient for diesel fuel engines than CeO. The performance of engine diesel fuel tests showed that the weight fraction of nanoparticles at 90 and 120 ppm give a similar performance,

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu May 15 2025
Journal Name
Route Educational And Social Science Journal
A PSYCHOSOCIAL ANALYSIS OF APPROACHING ZANZIBAR BY TINA HOWE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors

Publication Date
Wed Jul 01 2020
Journal Name
Plant Archives
evaluation of soils baghdad governorate pollution by radioactive elements
...Show More Authors

Scopus
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Heat Exchanger Performance by Using Dimpled Tube
...Show More Authors

The enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%.  The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref