Preferred Language
Articles
/
bsj-3231
Bioremediation of Petroleum Hydrocarbons Contaminated Soil using Bio piles System
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity.

Four bacterial strains were isolated from diesel contaminated soil samples. The isolates were identified by the Vitek 2 system, as Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae. The potential of biological surfactant production was tested using the Sigma 703D stand-alone tensiometer showed that these isolates are biological surfactant producers. The better results of the surface tension reduction test were obtained using the mixed bacterial culture which reduced the surface tension of the medium from 66mN/m to 33.89mN/m. For further evidence of the biodegradation effect of these isolates individually and as a mixed culture, which was supported by the use of Gas-Chromatography technology confirming the occurrence of biodegradation.

The capability of mixed bacterial culture was examined to remediate the diesel contaminated soil in bio piles system. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). Both systems were equipped with oxygen to provide aerobic conditions, incubated at ambient temperature and weekly sampling within 35 days (during summer season). Overall 75.71 % of the total petroleum hydrocarbons were removed from the amended soil and 33.18 % of the control soil at the end of study period. The study concluded that the ex-situ bioremediation (bio piles) is a good option for treating the soil contaminated with diesel as economical and environmentally friendly.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
Online medical consultation: covid-19 system using software object-oriented approach
...Show More Authors

The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. O

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 28 2015
Journal Name
Al-khwarizmi Engineering Journal
wavelength division multiplexing passive optical network modelling using optical system simulator
...Show More Authors

Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Publication Date
Tue Feb 27 2024
Journal Name
Tem Journal
Supervised Classification Accuracy Assessment Using Remote Sensing and Geographic Information System
...Show More Authors

Assessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Wavelength Division Multiplexing Passive Optical Network modeling Using Optical System Simulator
...Show More Authors

Abstract

Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Fri Sep 05 2014
Journal Name
Engineering And Technology Journal
New Method to Increase the Ability of the Water for Dissolving Total Salts in Soil by Using the Magnetism
...Show More Authors