In this paper flotation method experiments were performed to investigate the removal of lead and zinc. Various parameters such as pH, air flow rate, collector concentrations, collector type and initial metal concentrations were tested in a bubble column of 6 cm inside diameter. High recoveries of the two metals have been obtained by applying the foam flotation process, and at relatively short time 45 minutes . The results show that the best removal of lead about 95% was achieved at pH value of 8 and the best removal of zinc about 93% was achieved
at pH value of 10 by using 100 mg/l of Sodium dodecylsulfate (SDS) as a collector and 1% ethanol as a frother. The results show that the removal efficiency increased with increasing initial metal concentrations in the alkaline conditions while it decreased in the acidic condition. Increasing air flow rate up to 1000 ml/min enhanced the separation efficiency. Selective flotation experiments were also conducted in the presence of metalion mixture solutions. It was possible to separate lead and zinc under suitable condition, successful removals reached about 84% and 81% for lead and zinc respectively . It was observed that the first order equation fitted the data as good and better than any of the other equations.
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
Moment invariants have wide applications in image recognition since they were proposed.
The research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More