In this study, dead and live anaerobic biomass was used in biosorption of Pb(II), Cr(III) and Cd(II) ions from a synthetic wastewater. The biosorption was investigated by batch adsorption experiments. It was found that, the biosorption capacities were significantly affected by biosorbent dosage. The process follows Langmuir isotherm (regression coefficient 0.995, 0.99 and 0.987 for Pb(II), Cr(III) and Cd(II) ions, respectively, onto dead anaerobic biomass) model with uniform distribution over the biomass surface. The experimental uptake capacity was 51.56, 29.2 and 28 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto dead anaerobic biomass, compared with 35, 13.6 and 11.8 mg/g for Pb(II), Cr(III) and Cd(II), respectively, onto live anaerobic biomass. The percentage reductions of live compared with dead anaerobic biomass in uptake capacity were 32.3, 53.4 and 57.8 for Pb(II), Cr(III) and Cd(II), respectively. The results indicated that, the dead anaerobic biomass is suitable as an efficient biosorbent for the removal of Pb(II), Cr(III) and Cd(II) ions from wastewater.
Background: The goal of a root canal treatment is three dimensional obturation with a complete seal of the root canal system. The aim of this study was to evaluate and compare the effect of two warm obturation techniques, warm vertical compaction (WVC) and, carrier based obturation technique Gutta Core (GC), versus two cold obturation techniques, cold lateral compaction (CLC) and, single cone (SC) on push-out bond strength of bioceramic sealer (Total Fill) at three different root levels. Materials and Methods: Forty extracted maxillary first molars teeth with a straight round palatal root canal and mature apices were selected for this study. After sectioning the palatal roots to 11 mm from the root apex, the canals were prepared wit
... Show MoreBackground: The goal of a root canal treatment is three dimensional obturation with a complete seal of the root canal system. The aim of this study was to evaluate and compare the effect of two warm obturation techniques, warm vertical compaction (WVC) and, carrier based obturation technique Gutta Core (GC), versus two cold obturation techniques, cold lateral compaction (CLC) and, single cone (SC) on push-out bond strength of bioceramic sealer (Total Fill) at three different root levels. Materials and Methods: Forty extracted maxillary first molars teeth with a straight round palatal root canal and mature apices were selected for this study. After sectioning the palatal roots to 11 mm from the root apex, the canals were
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show More1-Alglul is the introduction of after prize or (Booty) secretly before it is divided, and the general sense is an absolute betrayal, and God has forbidden and the Prophet (Peace be upon him) by Muslims; such as bribery and gift-giving and other function by the terminology.
2-The signals and texts Alglul in the Covenant Rashidi and the Umayyad and Abbasid very few, compared to the Covenant of the Prophet, and so by the Quranic verses that were deprived Alglul and other Transmitting booty for the Muslims, and the hadith which magnified Alglul and showed its consequences in this life and the afterlife, and the tutelage of the Prophet (Peace be upon him) its active role in reducing Alglul, it was the great commandments included notificati