Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and SRB with percentage of 95, 95.3 and 99.7 % respectively, whereas, E. coli, P. Aerugenosa and SRB gave a copper adsorption percentage of (40.63, 50.51 and 80.57%) respectively at 37 ?C. Moreover, E.coli showed different percentage of metal adsorption ranged from 6.4% to 95 % with lead concentration of 100 and 200 ppm at pH4.5 and for each of 2 and 24 hrs contact time, whereas, it exerts percentage of copper adsorption ranged from 3.5 % to 40.63 % at 100 and 200 ppm and pH value of 4.5 for similar contact time. P. aerugenosa was also shown to be involved in metal adsorption with percentage ranged from 1.39 % for lead concentration of 150 ppm to 97.9 % for 200ppm under pH of 3 and contact times of 2 and 24 hrs. Interestingly, SRB exhibits significant differences in metal absorption values ranged from 14.97 % for lead (100 ppm) to 99.32 % at 200 ppm with a pH value of 3 and contact times of 2 and 24 hrs and under different temperatures.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract
The aim of the current research is to identify the level of availability of written expression skills included in the Arabic language curriculum document among middle school students from the teachers' point of view. The researcher used the descriptive approach. To analyze the data and access the research results, he used the (SPSS) program. The research was conducted during the first semester of the academic year 1442/1443 AH on a random sample of Arabic language teachers in the Bisha Education Department. They reached about (213) male and female teachers. The results revealed a number of indicators: the level of availability of written expression skills among middle school students in Bisha governorate
... Show MoreThis paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show MoreThe catalytic wet air oxidation (CWAO) of phenol has been studied in a trickle bed reactor
using active carbon prepared from date stones as catalyst by ferric and zinc chloride activation (FAC and ZAC). The activated carbons were characterized by measuring their surface area and adsorption capacity besides conventional properties, and then checked for CWAO using a trickle bed reactor operating at different conditions (i.e. pH, gas flow rate, LHSV, temperature and oxygen partial pressure). The results showed that the active carbon (FAC and ZAC), without any active metal supported, gives the highest phenol conversion. The reaction network proposed account
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreIn this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show More