Adsorption techniques are widely used to remove organics pollutants from waste water particularly, when using low cost adsorbent available in Iraq. Al-Khriet powder which was found in legs of Typha Domingensis is used as bio sorbent for removing phenolic compounds from aqueous solution. The influence of adsorbent dosage and contact time on removal percentage and adsorb ate amount of phenol and 4- nitro phenol onto Al-Khriet were studied. The highest adsorption capacity was for 4-nitrophenol 91.5% than for phenol 82% with 50 mg/L concentration, 0.5 gm. dosage of adsorbent and pH 6 under a batch condition. The experimental data were tested using different isotherm models. The results show that Freundlich model resulted in the best fit also
... Show MoreKE Sharquie, AA Noaimi, S Adnan, AM Al-Niddawi, WK Aljanabi, American Journal of Dermatology and Venereology, 2020 - Cited by 2
In this work Aquatic plant (Nile rose) was used to study adsorption of industrial dye (safranin-O from aqueous solution within several operation conditions. The dried leaves of Nile rose plant were used as adsorbents safranin-O from aqueous solution after different activations such as wet and dry enhancements. The data show increasing in dye solution removal percentage for both activation methods of the adsorbent and also dye removal percentage that was obtained by using adsorbent without any treatment with the progress contact time. The dye removal percentages at equilibrium time 40 minutes were 88.7% at non-activation, 92.3% at thermal activation, and 98.3% at acidic activation. The samples adsorbents before and after adsorption which wer
... Show MoreThis research presents the possibility of using banana peel (arising from agricultural production waste) as biosorbent for removal of copper from simulated aqueous solution. Batch sorption experiments were performed as a function of pH, sorbent dose, and contact time. The optimal pH value of Copper (II) removal by banana peel was 6. The amount of sorbed metal ions was calculated as 52.632 mg/g. Sorption kinetic data were tested using pseudo-first order, and pseudo-second order models. Kinetic studies showed that the sorption followed a pseudo second order reaction due to the high correlation coefficient and the agreement between the experimental and calculated values of qe. Thermodynamic parameters such as enthalpy change (ΔH
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More