In this study, iron was coupled with copper to form a bimetallic compound through a biosynthetic method, which was then used as a catalyst in the Fenton-like processes for removing direct Blue 15 dye (DB15) from aqueous solution. Characterization techniques were applied on the resultant nanoparticles such as SEM, BET, EDAX, FT-IR, XRD, and zeta potential. Specifically, the rounded and shaped as spherical nanoparticles were found for green synthesized iron/copper nanoparticles (G-Fe/Cu NPs) with the size ranging from 32-59 nm, and the surface area was 4.452 m2/g. The effect of different experimental factors was studied in both batch and continuous experiments. These factors were H2O2 concentration, G-Fe/CuNPs amount, pH, initial DB15 concentration, and temperature in the batch system. The batch results showed 98% of 100 mg/L of DB15 was degraded with optimum H2O2 concentration, G-Fe/Cu-NPs dose, pH, and temperature 3.52 mmol/L, 0.7 g/L, 3, and 50℃ respectively. For the continuous mode, the influences of initial DB15 concentration, feed flow rate, G-Fe/Cu-NPs depth were investigated using an optimized experimental Box-Behnken design, while the conditions of pH and H2O2 concentration were based on the best value found in the batch experiments. The model optimization was set the parameters at 2.134 ml/min flow rate, 26.16 mg/L initial dye concentration, and 1.42 cm catalyst depth. All the parameters of the breakthrough curve were also studied in this study including break time, saturation time, length of mass transfer zone, the volume of bed, and volume effluent.
With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreThe present study explores the solar-induced photocatalytic degradation of reactive red (RR) and reactive turquoise (RT) dyes in a single system using TiO2 immobilized in xanthan gum (TiO2/XG), synthesized using the sol–gel dip-coating technique for direct precipitation. SEM-EDX, XRD, FTIR, and UV–Vis were used to assess the characteristics of the resulting catalyst. Moreover, the effects of different operating parameters, specifically pH, dye concentration, TiO2/XG concentration, H2O2 concentration, and contact time, were also investigated in a batch photocatalytic reactor. The immobilized TiO2/XG catalyst showed a slight adsorption degradation efficiency and then improved the RR and RT dye degradation activity (92.5 and 90.8%
... Show MoreParliamentary investigation is one of the most important means of the parliament in its oversight on the work of the government. It is different from other types of investigations carried out by the Parliament itself, such as electoral or legislative investigation. It is also different from the investigation conducted by the administration or courts. This investigation is been conducted by a committee which consisted of some of members of parliament. The committee is looking to search the truth in a case related to the public interest and for that it usually has powers to access documents relevant to the case under investigation. Moreover, it has the right to request the presence of any government official before it. The committee usuall
... Show MoreIn this work, a numerical study is performed to predict the solution of two – dimensional, steady and laminar mixed convection flow over a square cylinder placed symmetrically in a vertical parallel plate. A finite difference method is employed to solve the governing differential equations, continuity, momentum, and energy equation balances. The solution is obtained for stream function, vorticity and temperature as dependent variables by iterative technique known as successive over relaxation. The flow and temperature patterns are obtained for Reynolds number and Grashof number at (Re= -50,50,100,-100) (positive or negative value refers to aidding or opposing buoyancy , +1 assisting flow, -1 opposing flow) and (102 to 105) , respective
... Show MoreThe presence and prevalence of V. cholerae were investigated in forty five water samples collected from different locations of Tiger River/ Baghdad city. Twenty one isolates were isolated by adopting a simple isolation techniques. The final identification revealed that only three isolates were confirmed as V. cholerae. They were named 1J, 1R and Dial 131 which are all serogrouped as non-O1. Toxin Coregulated Pili (TCP) and heat labile enterotoxin (LT) were determined in only the environmental isolate 1J while non of the isolates produced heat stabile toxin (ST). The purification scheme was improved, few steps were adopted to include back extraction of ammonium sulfate, saturation between 80-20%, desalting through Sephadex G25, and gel filt
... Show More