Mercury is a heavy metal that is extremely toxic. There are three types of it: inorganic, organic, and elemental. Mercury in all its forms has been shown to have harmful effects on living things. It can multiply its concentration from lower to higher trophic levels and accumulate in the body's various tissues. Aquatic organisms bodies have been exposed to mercury mostly through various human activities. The largest source of mercury pollution in the air is thermal power plants that mostly use coal as fuel. It is carried to a body of water after being deposited on the ground surface from the air. The way it enters the food chain is through aquatic plants and animals. Mercury accumulations in the kidney, liver, gills, or gonadal tissues of species that are readily exposed and ingested in aquatic organisms environments. There are possible effects of mercury exposure at both acute and long-term levels. The length of time, the mode of exposure, and the dosage all affect how harmful a substance is. The current study provides information about the harmful effects of mercury in aquatic organisms environments. Even though significant mitigation measures and recommendations were implemented, this assessment provides a comprehensive account of mercury sources and emissions, as well as their destiny and movement across the various environmental compartments. Because of the existing mercury emissions and stability, eating fish still poses a major risk. Aquatic life may be toxically affected by mercury pollution in freshwater environments. Through the food chain, mercury buildup in aquatic organisms can also endanger human health. Aquatic creatures include macroinvertebrates and fish. which people ingest and put their health at serious risk. The effect of mercury on hydrocarbons and how it enters the food chain to reach humans has been identified.
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreInternational Journal on Technical and Physical Problems of Engineering
Starting from 4, - Dimercaptobiphenyl, a variety of phenolic Schiff bases (methylolic, etheric, epoxy) derivatives have been synthesized. All proposed structure were supported by FTIR, 1H-NMR, 13C-NMR Elemental analysis all analysis were performed in center of consultation in Jordan Universty.
The study involves removing of [Alizarin Red S (ARS) and Alizarin yellow R (AYR)] by using Iraqi Siliceous Rocks Powder (SRP). Adsorption isotherms were studied and the factors which influence it, such as temperature and salt effect. Adsorption isotherms of (ARS) were found to be comparable to Temkin equation. Adsorption isotherms of (AYR) were found to be comparable to Freundlich equation. The adsorption process on this surface was studied at different temperatures. The results showed that the adsorption of (ARS,AYR) on surface increased with increasing temperature (Endothermic process). According to the above results the thermodynamic functions (ΔH, ΔG, ΔS) were calculated. The adsorption quantity increasing for (ARS, AYR) with increas
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MoreA comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.