Reverse osmosis membrane desalination is one of the most significant water treatments that is used to offer freshwater. The aim of this research is to study the effect of controlling the value of the zeta potential on the suspended particles in the water and the proximity of the membrane surfaces in the colloidal solution, to keep the water stable electrically and disperse the colloidal particles. To achieve this aim, the experimental study was conducted in the Sanitary Engineering Laboratory, in the engineering college - University of Baghdad. Two systems were set up, one worked normally and the other worked by using the zeta rod placed before the reverse osmosis membrane. The results showed that the effect of the zeta rod increased all parameters (Total Dissolved Solids (TDS), Electric Conductivity (Ec), Tur., phosphate (pH), chlorine (Cl), calcium (Ca), Sodium (Na), and Fluoride (F)), when compared with the system that worked normally. This effect was due to the added effort of the colloidal particles that saved them in the suspension. This also improved the performance of the reverse osmosis membrane, by increasing the permeate flux by 23.6%, and decreasing the real feed pressure by 9.92%. Therefore, this effect increased the production of water in the system and extended the life of the membrane.The application of the zeta rod before the reverse osmosis membrane will affect the colloidal particles by adding them some efforts, so this keep them suspended and prevent the formation of sediments on the membrane
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreThe variety of clean energy sources has risen, involving many resources, although their fundamental principles remain consistent in terms of energy generation and pollution reduction. The using of hydropower system for energy production also has a dynamic impact in which it utilizes to harness the water for the purpose of energy production. As it is important to overcome the problem of accidents in the highway and rural areas in the case of server rainfall and flood by implementation a smart system that used for energy production. This paper aims to develop a controlled hydropower system installed in the drainage sinks allocated in highway roads used for producing. The proposed system consists of storage unit represented by pipes used for t
... Show MoreBox-Wilson experimental design method was employed to optimized lead ions removal efficiency by bulk liquid membrane (BLM) method. The optimization procedure was primarily based on four impartial relevant parameters: pH of feed phase (4-6), pH of stripping phase (9-11), carrier concentration TBP (5-10) %, and initial metal concentration (60-120 ppm). maximum recovery efficiency of lead ions is 83.852% was virtually done following thirty one-of-a-kind experimental runs, as exact through 24-Central Composite Design (CCD). The best values for the aforementioned four parameters, corresponding to the most restoration efficiency were: 5, 10, 7.5% (v/v), and 90 mg/l, respectively. The obtained experimental data had been
... Show MoreIn this work, the extraction of glycyrrhizin from Licorice using bulk liquid membrane technique was developed and optimized. The effect of various parameters such as pH of stripping and donor solutions, temperature, stirring speed and kinetic parameters were investigated. Moreover, to study the impact of the polarity of membrane solvent, two types of extraction solvents were used as a membrane solvent: n-Hexane was used as a non-polar solvent and 1-Hexanol was as a polar solvent. The optimum extraction condition was found (95.53%) using 1-Hexanol, rotating speed was 400 rpm, and pH of the acceptor and donor solutions were 8 and 5.5, respectively. The reaction kinetics constants ( and ) for the transport of glycyrrhizin from the donor pha
... Show More