Preferred Language
Articles
/
yoalPIYBIXToZYAL-H-E
Comparative Study between Nanofiltration and Reverse Osmosis Membranes for the Removal of Heavy Metals from Electroplating Wastewater
...Show More Authors

The present work aimed to study the efficiency of nanofiltration (NF) and reverse osmosis (RO) process for water recovery from electroplating wastewater and study the factors affecting the performance of two membrane processes. Nanofiltration and reverse osmosis membranes are made from polyamide as spiral wound module. The inorganic materials ZnCl2, CuCl2.2H2O, NiCl2.6H2O and CrCl3.6H2O were used as feed solutions. The operating parameters studied were: operating time, feed concentrations for heavy metal ions, operating pressure, feed flow rate, feed temperature and feed pH. The experimental results showed, the permeate concentration increased and water flux decreased with increase in time from 0 to 70 min. The permeate concentrations increased and flux decreased with increase in feed concentrations from 10 to 300 mg/l. Raising of pressure from 1 to 4 bar, permeate concentration decreased for RO, for NF decreased and then increased at high pressure and increase the flux. The rises of flow rate from 20 to 50 l/h decreased permeate concentration and the flux increase. The rises of temperature from 26 to 40 °C, increased permeate concentration and increased the flux. The rise in pH from 4 to 7, decreased the flux as the pH goes from acidic side towards alkaline. The polyamide nanofiltration membrane had allowed permeation of chromium and copper ions to lower than permissible limits. Nanofiltration membrane had allowed permeation of nickel and zinc ions at low concentration of these ions. The polyamide RO membrane gave a high efficiency for removal of chromium, copper, nickel and zinc and it had allowed permeation of these ions to the lower than permissible limits. The rejection at first three minutes when the feed concentration approximately was constant for chromium in NF and RO, was 99.7% and 99.93%, for copper was 98.43% and 99.33%, for zinc was 97.96% and 99.49%, and for nickel was 97.18% and 99.49% respectively. The maximum recovery for chromium in NF and RO was 71.75% and 48.5%, for copper was 75.62% and 50.68%, for zinc was 80.87% and 54.56%, for nickel was 60.06% and 46.18% respectively. For a mixture of synthetic electroplating wastewater, nanofiltration and reverse osmosis membranes have a high rejection percentage for heavy metal ions. It was obtained pure water and concentrations of less than allowable limits for heavy metals in the case of the mixture.

Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (236)
Crossref (179)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (32)
Crossref (23)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Dermatology Research And Practice
Interleukin-15 and Tumor Necrosis Factor-α in Iraqi Patients with Alopecia Areata
...Show More Authors

Background. Alopecia areata (AA) is a common form of noncicatricial hair loss of unknown cause, affecting 0.1-0.2% of the general population. Most evidence supports the hypothesis that it is disease of the hair follicle of autoimmune nature mediated by T-cells, with important cytokine role. Objective of the Study. The objective of this study is to study the association and changes in serum levels of interleukin-15 (IL-15) and tumor necrosis factor-α (TNF-α) in patients with AA in relation to the type, activity, and disease duration. Patients and Methods. Thirty-eight patients with AA and 22 individuals without the disease as controls were enrolled in this case-controlled study conducted in the Department of Dermatology in the Al-K

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (230)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Oct 22 2023
Journal Name
مجلة الدراسات المستدامة
Strategies, Techniques and Activities Used by English Language Teachers in Employing Online Teaching
...Show More Authors