Bioremoval of chromium from wastewater of tannery factory in Iraq was studied. The bacteria Proteus vulgaris 7E showed an enhanced capability in biosorping chromium when its concentration increased in the solution, reaching a maximum of 476,7 mg/ ml out of 492 mg/ ml under optimum conditions at pH 6 and 50°C at one hour contact time and biomass of 1 mg/ml. The present results showed that dead cells of P. vulgaris 7E biosorbed 87.41 mg/ml of chromium in comparison with91.18 mg/ml of chromium biosorbed by living cells, this indicates the insignificant effect of physiological state of cells. It was found that the above biosorption is physico-chemical process depends upon electrostatic attraction forces. The results has illustrated that the
... Show MoreThe low-pressure sprinklers have been widely used to replace the high-pressure impact sprinklers in the lateral move sprinkler irrigation system due to its low operating cost and high efficiency. However, runoff losses under the low-pressure sprinkler irrigation machine can be significant. This study aims to evaluate the performance of the variable pulsed irrigation algorithm (VPIA) in reducing the runoff losses under low-pressure lateral move sprinkler irrigation machine for three different soil types. The VPIA uses the ON-OFF pulsing technique to reduce the runoff losses by controlling the number and width of the pulses considering the soil and the irrigation machine properties. Als
Each phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More