The present study develops the sorption model for simulating the effects of pH and temperature on the uptake of cadmium from contaminated water using waste foundry sand (WFS) by allowing the variation of the maximum adsorption capacity and affinity constant. The presence of two acidic functional groups with the same or different affinity is the basis in the derivation of the two models; Model 1 and Model 2 respectively. The developed Bi-Langmuir model with different affinity (Model 2) has a remarkable ability in the description of process under consideration with coefficient of determination > 0.9838 and sum of squared error < 0.08514. This result is proved by FTIR test where the weak acids responsible of cadmium ions removal using WFS sorbent can be represented by surface silanol (O-H) functional groups.
The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
Islam was keen to get every man and woman a share of those benefits and wanted to marry and urged him. In order to unite efforts and articulates the arrow and clarifies the goal and I have a share in building a sober Islamic society, for all this and other research title is ((modern or planting and its impact on marital happiness)).
The research aims to release the concept of auditing reporting and its role in the rationalization of economic decisions in the companies listed in the Iraq Stock Exchange from the viewpoint of academics, professionals, investors and lenders. Auditor reporting witnessed the great progress in many areas addressed many of the previous studies compare with Iraqi auditors reporting because there are some defects in these aria .The research problem focused whether the auditor report in Iraq is contains useful information to rationalize investment decisions & lending decisions in the shareholding companies listed on the Iraq Stock Exchange , and under that premise , " There is statistically significant relationship between the reporting au
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreThe research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show MoreLike the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
The study was conducted on twenty dogs from variety breeds to estimate the
incidence of tumor mass and determine the risk factors of survey to cases of a year
in veterinary hospital in Baghdad. The most common clinical signs were, ulceration,
bleeding into lesions in addition to drowsiness, anorexia, fever and the others were
depended tumor's location in dog's body like lameness, lacrimation and bloody
constipation etc.
The results showed 70% of the infected dogs were working with military forces
and 30% of them were pet dogs and we found that the highest percentage of tumor
accrued in dogs aged more than 10 years and the females recorded 60% of infection.
Terrier breed had the highest percentage of infection (