This study was aimed to assess the efficiency of N.oleander to remove heavy metals such as Copper (Cu) from wastewater. A toxicity test was conducted outdoor for 65-day to estimate the ability of N.oleander to tolerate Cu in synthetic wastewater. Based on a previous range-finding test, five concentrations were used in this test (0, 50, 100, 300, 510 mg/l). The results showed that maximum values of removal efficiency was found 99.9% on day-49 for the treatment 50 mg/l. Minimum removal efficiency was 94% day-65 for the treatment of 510 mg/l. Water concentration was within the permissible limits of river conservation and were 0.164 at day-35 for the 50 mg/l treatment, decreased thereafter until the end of the observation, and 0.12 at day-65 for the treatment 100 mg/l. the concentrations of water samples exceeded the permissible limits for 300 and 510 mg/l throughout the observation. Bioaccumulation factor (BAF) for N.oleaner was found to be greater than one for all the treatments. Higher translocation factor (TF) were 1.65, 1.73, 2.61 and 2.34 mg/l for 50, 100, 300 and 510 mg/l, respectively. This study revealed that N.oleander can tolerate and treat Cu concentration in wastewater.
The current research aims to identify the multiple intelligences in the fourth students’ acquisition of the literary processes of Arabic grammar and to identify the differences in multiple intelligence according to gender (males - females). The study was determined for students of the fourth literary preparatory Al-Hakim Preparatory (for males) and Rabat Preparatory (for females) of the Second Karkh Education Directorate, topics from the Arabic grammar subject (past tense, present tense, imperative, subject, and object) for the first semester of the academic year 2019-2020. The results showed that there were no statistically significant differences at the significance level (0.05) between the average scores of the students who were tau
... Show MoreTin oxide films (SnO2) of thickness (1 ?m) are prepared on glass substrate by post oxidation of metal films technique. Films were irradiated with Nd:YAG double frequency laser of wavelength (532 nm) pulses of three energies (100, 500, 1000) mJ. The optical absorption, transmission, reflectance, refractive index and optical conductivity of these films are investigated in the UV-Vis region (200-900) nm. It was found that the average transmittance of the films is around (80%) at wavelength (550 nm) and showed high transmission (? 90 %) in the visible and near infrared region. The absorption edge shifts towards higher energies, which is due to the Moss-Burstien effect and it lies at (4 eV). The optical band gap increased with increasing of ene
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show More: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod
... Show Morehe aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail
... Show MoreThe feature extraction step plays major role for proper object classification and recognition, this step depends mainly on correct object detection in the given scene, the object detection algorithms may result with some noises that affect the final object shape, a novel approach is introduced in this paper for filling the holes in that object for better object detection and for correct feature extraction, this method is based on the hole definition which is the black pixel surrounded by a connected boundary region, and hence trying to find a connected contour region that surrounds the background pixel using roadmap racing algorithm, the method shows a good results in 2D space objects.
Keywords: object filling, object detection, objec
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More