Plantation of humic acid nanoparticles on the inert sand through simple impregnation to obtain the permeable reactive barrier (PRB) for treating of groundwater contaminated with copper and cadmium ions. The humic acid was extracted from sewage sludge which is byproduct of the wastewater treatment plant; so, this considers an application of sustainable development. Batch tests signified that the coated sand by humic acid (CSHA) had removal efficiencies exceeded 98 % at contact time, sorbent dosage, and initial pH of 1 h, 0.25 g/50 mL and 7, respectively for 10 mg/L initial concentration and 200 rpm agitation speed. Results proved that physicosorption was the predominant mechanism for metals-CSHA interaction because the sorption data followed pseudo-first-order model. The maximum sorption capacity (qmax) of copper and cadmium reached to 87.5 and 18.9 mg/g, respectively. Characterization tests proved that humic acid nanoparticles were precipitated on the sand surfaces. The computer solution (COMSOL) Multiphysics 3.5a had a high ability in the explanation of experimental migration of adopted metal ions. Measurements and model predictions signified that there was a delay in the propagation of metal front due to decrease of concentration and flow rate at specific bed depth.
Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u
... Show MoreThis study outlines the synthesis of substituted 1,2,4-triazole derivatives through the cyclization reaction of thiourea derivatives. The process begins with the reaction of different halides with KSCN to produce isothiocyanate derivatives. then followed by a reaction with isonicotinic acid hydrazide to yield thioureas (1-6), with a yield rate of (72-88%). Then, compounds (1-6) were treated with alkaline medium 4 N (NaOH) to produced 1,2,4-triazole derivatives (7-12) with a yield (51-69%).The structure of the prepared compounds was characterized using FTIR,1HNMR and 13CNMR spectroscopy. Some of the synthesized compounds were tested for antimicrobial activity when, compound 9 showed strong activity against gram positive bacteria (Sta
... Show MoreChar formation is subdivided into three lithological types according to the percentage of detrital quartz and calcite (micrite and sparite), through the petrographic study of 13 thin sections collected from a section at Wadi Al-Ratgha (west of Al-Qaim, Iraq Western Desert). The three rock units are: Limy sandstone, limestone and sandy limestone. Depending on the mean gain size of detrital quartz and degree of sorting and the type of matrix, Ghar Formation can be classified in to three types, i. e. off-shore sediments with low energy environment, near shore sediments with high energy environment and mixed sediments with transitional energy environment. This is due to local transgression and regression of sea level at late lower Miocene du
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThis study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network (ANN) and multiple linear regression (MLR). The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were received, giving a response rate of 89.74% for the research region. The collected data were processed using the ANN technique in MATLAB v20. The same database was utilized to
Future wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreAbstract Exotoxin A is the most lethal virulence factor produced by Pseudomonas aeruginosa. It inhibits elongation factor-2 by ADP-ribosylation of EF2. This causes stop of the elongation of polypeptides. In recent study, the effect of low concentration of exotoxin A on some important internal organs of mice was studied. Four groups white mice were injected intraperitonialy with pure exotoxin A in the following manner 0.1, 0.2, 0.3, 0.4 ng\ animals. One mouse receives normal saline inrtaperitonialy as a control. After 72 hours the mice were killed and four organs were taken, liver, spleen, lung and heart from each killed mice. Histological sections were made from each organ and stained with hematoxylin and eosin stain then examined under mic
... Show More