This research was conducted to study the histological structure of the eye in the tree frog (Hyla arborea savignyi) and showed that it is composed of the eyeball and the lens and optic nerve. Appeared eyeball is surrounded by three Tunica from the inside to the outside are Tunica Interna, Tunica vasculosa, Tunica fibrosa. The tunica interna consists of the retina that consists of 10 layers are from outer to inner pigment epithelial layer, rods and cones layer, external limiting membrane, outer nuclear layer, outer plexiform layer, inner nuclear layer, inner plexiform layer , ganglion cells layer , nerve fibers layer, internal limiting membrane .The vascular tunic or Uvea consists of the choroid, ciliary body , and iris . The fibrous coat consists of sclera ,cornea ,limbus cornea. The lens showed Biconvex discoid.
In this paper, split-plate airlift electrochemical reactor as an apparatus with new configuration for wastewater treatment was provided. Two aluminum plates were fixed inside the reactor and present two functions; first it works as split plates for internal loop generation of the airlift system (the zone between the two plates acts as riser while the other two zones act as downcomer) and second it works as two electrodes for electrocoagulation process. Simulated wastewater contaminated with zinc ions was used to test the performance of this apparatus for zinc removal by studying the effect of different experimental variables such as initial concentration of zinc (50-800 ppm), electrical current density (2.67-21.4 mA/cm2), init
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure