In this work, microbubble dispersed air flotation technique was applied for cadmium ions removal from wastewater aqueous solution. Experiments parameters such as pH (3, 4, 5, and 6), initial Cd(II) ions concentration (40, 80, and 120 mg/l) contact time( 2, 5, 10 , 15, and 20min), and surfactant (10, 20and 40mg/l) were studied in order to optimize the best conditions .The experimental results indicate that microbubbles were quite effective in removing cadmium ions and the anionic surfactant SDS was found to be more efficient than cationic CTAB in flotation process. 92.3% maximum removal efficiency achieved through 15min at pH 5, SDS surfactant concentration 20mg/l, flow rate250 cm3/min and at 40mg/l Cd(II) ions initial concentration. The removal efficiency of cadmium ion was predicted through 11 neurons hidden layer, with a correlation coefficient of 0.9997 between ANN outputs and the experimental data and through sensitivity analysis, pH was found to be most significant parameter (25.13 %).The kinetic flotation order for cadmium ions almost first order and the removal rate constant (k) increases with decreasing the initial metal concentration.
Titanium alloy (Ti-6Al-4V or Gr.23) was widely used as a dental alloy. In the current study, polymerization of eugenol (PE) on Gr.23 titanium alloys was conducted by an electrochemical process before and after being treated by Micro Arc Oxidation (MAO). The formed films were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), and X-ray diffraction (XRD). The corrosion behavior of Gr.23 alloy in an artificial saliva environment at a temperature range of 293–323 K has been studied and assessed by means of electrochemical polarization and impedance spectroscopy techniques. Three cases are taken into consideration; bare Gr.23, Gr.23 coated by PE, and Gr.23 coated by PE after MAO treatment. The maxi
... Show MoreObserved visually prominent lumps on the surface of the lung or embedded in lung tissue and microscopically Register Anfaj thrombosis with pulmonary carcinoma that took shape food or with the composition of the vesicles papillomavirus lining cells cubic vertical or connective tissue and increase
This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p
... Show MoreIn this study, experimental mortar combinations with 1% micro steel fibers, were examined to create geopolymer mortars. To test the effect of the fibers on the mortar's resistance, the geopolymer mortar was designed with various proportions of more environmentally friendly materials fly ash and slag. The percentage of fly ash by weight was 50, 60, and 70% of the slag. The best results were obtained when a 50:50 ratio of fly ash and slag were mixed with 1% micro steel fibers. The results showed that the mixtures containing fibers performed better in the considered tests (toughness index, ductility index, and resilience index). In the impact resistance test, the mixture contained 50% fly ash by weight of the slag with a temperature of
... Show MoreCloud point extraction is a simple, safe, and environmentally friendly technique for preparing many different kinds of samples. In this review, we discussed the CPE method and how to apply it to our environmental sample data. We also spoke about the benefits, problems, and likely developments in CPE. This process received a great deal of attention during preconcentration and extraction. It was used as a disconnection and follow-up improvement system before the natural mixtures (nutrients, polybrominated biphenyl ethers, pesticides, polycyclic sweet-smelling hydrocarbons, polychlorinated compounds, and fragrant amines) and inorganic mixtures were examined and many metals like (silver, lead, cadmium, mercury, and so on). We also find
... Show MoreSurvival analysis is widely applied to data that described by the length of time until the occurrence of an event under interest such as death or other important events. The purpose of this paper is to use the dynamic methodology which provides a flexible method, especially in the analysis of discrete survival time, to estimate the effect of covariate variables through time in the survival analysis on dialysis patients with kidney failure until death occurs. Where the estimations process is completely based on the Bayes approach by using two estimation methods: the maximum A Posterior (MAP) involved with Iteratively Weighted Kalman Filter Smoothing (IWKFS) and in combination with the Expectation Maximization (EM) algorithm. While the other
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More