In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15 concentration, and temperature in the batch system. The batch results showed 98% of 100 mg/L of DB15 was degraded with optimum H2O2 concentration, G-Fe/Cu-NPs dose, pH, and temperature 3.52 mmol/L, 0.7 g/L, 3, and 50℃ respectively. For the continuous mode, the influences of initial DB15 concentration, feed flow rate, G-Fe/Cu-NPs depth were investigated using an optimized experimental Box-Behnken design, while the conditions of pH and H2O2 concentration were based on the best value found in the batch experiments. The model optimization was set the parameters at 2.134 ml/min flow rate, 26.16 mg/L initial dye concentration, and 1.42 cm catalyst depth. All the parameters of the breakthrough curve were also studied in this study including break time, saturation time, length of mass transfer zone, the volume of bed, and volume effluent.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreSewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.
In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage
... Show MoreElectrodeposition of metal oxides on graphite electrodes can improve their ability to remove organic substances. In this work, multicomponent oxides of Mn, Co, and Ni were electrochemically deposited on both the anode and cathode of graphite electrodes to enhance their performance in removing phenol. Formation of the deposit was achieved within 2 h in current densities of 20, 25, 30, and 35 mA/cm2 for better composite properties. The deposited layer was characterized by testing the surface structure, morphology, composition, and roughness. X-ray diffraction (XRD), scanning electron microscopy (SEM), energy dispersive X-ray (EDX), and Atomic force microscopy (AFM) techniques facilitated these tests. The composite electrodes have synthesized
... Show More
As a reservoir is depleted due to production, pore pressure decreases leading to increased effective stress which causes a reduction in permeability, porosity, and possible pore collapse or compaction. Permeability is a key factor in tight reservoir development; therefore, understanding the loss of permeability in these reservoirs due to depletion is vital for effective reservoir management. The paper presents a case history on a tight carbonate reservoir in Iraq which demonstrates the behavior of rock permeability and porosity as a function of increasing effective stress simulating a depleting mode over given production time. The experimental results show unique models for the decline of permeability and porosity as function effective str
... Show MoreAbstract
This Research aims for harnessing critical and innovative thinking approaches besides innovative problem solving tools in pursuing continual quality improvement initiatives for the benefit of achieving operations results effectively in water treatment plants in Baghdad Water Authority. Case study has been used in fulfilling this research in the sadr city water treatment plant, which was chosen as a study sample as it facilitates describing and analyzing its current operational situation, collecting and analyzing its own data, in order to get its own desired improvement opportunity be done. Many statistical means and visual thinking promoting methods has been used to fulfill research task.
... Show MoreFuture generations of wireless communications systems are expected to evolve toward allowing massive ubiquitous connectivity and achieving ultra-reliable and low-latency communications (URLLC) with extremely high data rates. Massive multiple-input multiple-output (m-MIMO) is a crucial transmission technique to fulfill the demands of high data rates in the upcoming wireless systems. However, obtaining a downlink (DL) training sequence (TS) that is feasible for fast channel estimation, i.e., meeting the low-latency communications required by future generations of wireless systems, in m-MIMO with frequency-division-duplex (FDD) when users have different channel correlations is very challenging. Therefore, a low-complexity solution for
... Show More