Preferred Language
Articles
/
joe-2356
Removal of Water Turbidity by Different Coagulants
...Show More Authors

During the last decade, there has been a concern about the relation between aluminum residuals in treated water and Alzheimer disease, and more interest has been considered on the development of natural coagulants. The present study aimed to investigate the efficiency of alum as a primary coagulant in conjunction with mallow, Arabic gum and okra as coagulant aids for the treatment of water samples containing synthetic turbidity of kaolin. Jar test experiments were carried out for initial raw water turbidities 100, 200 and 500 (NTU). The optimum doses of alum, mallow, Arabic gum and okra were 20, 2, 1 and 1 mg/L for100 NTU turbidity level, 35, 4, 2 and 3 mg/L , for 200NTU turbidity level and 50, 8, 10 and 8 mg/L for 500 NTU turbidity level, respectively. The optimum pH was 7 for alum, and 7.5 for mallow, Arabic gum and okra. The residual turbidity was 3.34 to 6.81 NTU by using alum as a primary coagulant with mallow, Arabic gum and okra, and pH values of the treated water by the natural coagulants were 6.1 to 7.01. The optimum dose of the
natural coagulants in the present study has higher efficiency in removing high turbidity in comparison with low turbidity.
Natural coagulant showed many advantages in coagulation/flocculation process. By using natural coagulants, considerable decreasing in Al2(SO4)3 consumption, and Increasing in the rate of sedimentation can be achieved.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
BatchHeavy MetalsBiosorption by Punica granatum Peels: Equilibrium andKinetic Studies
...Show More Authors

This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view o

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Lead bioremoval by Bacillus spp. Isolated from industrial wastewater
...Show More Authors

Four samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 03 2021
Journal Name
Journal Of Optoelectronic And Biomedical Materials
Antibacterial activity with eggshell nanoparticles activated by microwave plasma.
...Show More Authors

The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg

... Show More
Preview PDF
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung
...Show More Authors

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF