In this study, low cost biosorbent ̶inactive biomass (IB) granules (dp=0.433mm) taken from drying beds of Al-Rustomia Wastewater Treatment Plant, Baghdad-Iraq were used for investigating the optimum conditions of Pb(II), Cu(II), and Ni(II) biosorption from aqueous solutions. Various physico-chemical parameters such as initial metal ion concentration (50 to 200 mg/l), equilibrium time (0-180 min), pH (2-9), agitation speed (50-200 rpm), particles size (0.433 mm), and adsorbent dosage (0.05-1 g/100 ml) were studied. Six mathematical models describing the biosorption equilibrium and isotherm constants were tested to find the maximum uptake capacities: Langmuir, Freundlich, Redlich–Peterson, Sips, Khan, and Toth models. The best fit to the P
... Show More There is an increase in the need for cost accounting in all organizations and from different sectors to provide detailed information to the totals of financial accounting, first and help solve problems associated with inventory and analysis, tabulation and allocation of cost elements II and do the planning process and provide the necessary oversight and help to take the right decisions such as pricing decisions that need to Information cost accounting.
And suffer most of the non-governmental organizations from the lack of a cost accounting system provides information on the cost of service in these organizations and the department research sample circle v
<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>) below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are
... Show MoreObjective Neutrophils own an arsenal of dischargeable chemicals that enable them to handle bacterial challenges, manipulating innate immune response and actual participation in acquired immunity. The reactive oxygen species (ROS) are one of the most important chemicals that neutrophils discharge to eradicate pathogens. Despite their beneficial role, the ROS were strongly correlated to periodontal tissue destruction. Lowdensity neutrophils (LDN) have been recognized for producing enhanced quantities of ROS. However, the potential role of ROS produced by LDN in periodontitis is unknown. The aim of the study was to investigate the impact of ROS produced by LDN in periodontal diseases.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show More