Treatment of a high strength acidic industrial wastewater was attempted by activated carbon
adsorption to evaluate the feasibility of yielding effluents of reusable qualities. The experimental
methods which were employed in this investigation included batch and column studies. The
former was used to evaluate the rate and equilibrium of carbon adsorption, while the latter was
used to determine treatment efficiencies and performance characteristics. Fixed bed and expanded
bed adsorbers were constructed in the column studies. In this study, the adsorption behavior of acetic acid onto activated carbon was examined as a function of the concentration of the adsorbate, contact time and adsorbent dosage. The adsorption data was modeled with Freundlich and Langmuir adsorption isotherms.The amount of acetic acid adsorbed increased with the decrease in initial concentration of acetic acid and increased with the increase in contact time and adsorbent dose. The effects of various
important and influencing parameters such as flow rate, bed height, inlet adsorbate concentration
on breakthrough curve are studied in details in the column studies.
ABSTRACT
Two compounds were isolated from the fruit part of Rhus coriaria that grow wildly or cultivated in the north of Iraq. The compounds were separated by preparative high-Performance Liquid Chromatography and their structures were established based on detailed spectroscopic techniques like FTIR and LC-MS/MS.
Keywords: Rhus coriaria, Preparative HPLC, LC-MSMS, FTIR
In this work, the dyes Rhodamine B and Coumarin 102 containing titanium dioxide nanoparticles were used as scattering centers to fabricate a random gain medium. The laser dye was dissolved in hexanol and methanol solvent respectively. The titanium dioxide nanoparticles were synthesized by DC reaction magnetron spraying technique. The random-gain medium was made by adding 2.5 mg of titanium dioxide nanoparticles to Rhodamine and coumarin 102 dyes by coating the glass cell with two-sided titanium dioxide with high spectral efficiency and low production cost. A narrow line optical emission was detected at 565 nm for Rhodamine B and 534 nm for coumarin 102, where it was found that rhodamine B dye has FWHM 8 nm and coumarin dye 102 has FWHM 9 nm
... Show MoreThe current study aims to assess the effectiveness of the cognitive-behavioral programs in reducing stuttering and social anxiety among high-school students. The researchers used the experimental design. The sample consists of (20) male students who reported the highest score on the stuttering severity scale and social anxiety scale. The sample was divided into experimental and control groups (each group consists of 10 participants). The researcher used the type and severity of stuttering scale developed by Onslow et al (2003), translated by Mahmoud Ismail and the social anxiety scale was prepared by the authors. The results showed that there are statistically significant differences in pre-post and follow-up tests amongst the experiment
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More