This study is to investigate the possibility of using activated carbon prepared from Iraqi date-pits (ADP) which are produced from palm trees (Phoenix dactylifera L.) as low-cost reactive material in the permeable reactive barrier (PRB) for treating lead (Pb<sup>+2</sup>) from the contaminated groundwater, and then compare the results experimentally with other common reactive materials such as commercial activated carbon (CAC), zeolite pellets (ZP). Factors influencing sorption such as contact time, initial pH of the solution, sorbent dosage, agitation speed, and initial lead concentration has been studied. Two isotherm models were used for the description of sorption data (Langmuir and Freundlich). The maximum lead sorption capacities were measured for ADP, CAC, and ZP and were found to be 24.5, 12.125, and 4.45 mg/g, respectively. The kinetic data were analyzed using various kinetic models particularly pseudo-first-order, pseudo-second-order, and intraparticle diffusion. COMSOL Multiphysics 3.5a depend on finite element procedure was applied to formulate transmit of lead (Pb<sup>+2</sup>) in the two-dimensional numerical (2D) model under an equilibrium condition. The numerical solution shows that the contaminant plume is hindered by PRB.
ABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreA session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Predicting the network traffic of web pages is one of the areas that has increased focus in recent years. Modeling traffic helps find strategies for distributing network loads, identifying user behaviors and malicious traffic, and predicting future trends. Many statistical and intelligent methods have been studied to predict web traffic using time series of network traffic. In this paper, the use of machine learning algorithms to model Wikipedia traffic using Google's time series dataset is studied. Two data sets were used for time series, data generalization, building a set of machine learning models (XGboost, Logistic Regression, Linear Regression, and Random Forest), and comparing the performance of the models using (SMAPE) and
... Show MoreNon-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
The study in duded isolation and identification of microbial isolates from oral cavity to 10 volunteers, diagnosed within the three groups: Staphylococcus aureus, Staphylococcus epidermidis, Streptococcus spp. and Candida albicans . The sensitivity test of all isolates bacteria Streptococcus spp. , S. aureus and S. epidermidis showed high resistance to Ampicillin(100)%,followed Methicillin (88.88)% and Amoxicillin / clavulanic acid(77.77)%, while the resistance for each of Vancomycin and Amoxicillin were (66.66)%, and the resistance to Erythromycin and Pencillin (55.55)% to each of them. The results showed less resistance to Trimethoprim (22.22)% and Cefalotine (11.11)% of all bacteria isolate. Investigation of the pre
... Show MoreThe relationship between prey and predator populations is hypothesized and examined using a mathematical model. Predation fear, cannibalism among the prey population, and a refuge reliant on predators are predicted to occur. This study set out to look at the long-term behavior of the proposed model and the effects of its key elements. The solution properties of the model were investigated. All potential equilibrium points' existence and stability were looked at. The system's persistence requirements were established. What circumstances could lead to local bifurcation near equilibrium points was uncovered. Suitable Lyapunov functions are used to study the system's overall dynamics. Numerical simulations were conducted to verify the
... Show MoreFoundations supporting reciprocating engines, radar towers, turbines, large electric motors, and generators, etc. are subject to vibrations caused by unbalanced machine forces as well as the static weight of the machine. If these vibrations are excessive, they may damage the machine or cause it not to function properly. In the case of block foundation, if changes in size and mass of the foundation do not lead to a satisfactory design, a pile foundation may be used. In this study, the dynamic response of piles and pile Groups in dry sand is investigated experimentally. The analysis involves the displacement response under harmonic excitation. In addition, a numerical modeling by using finite element method with a three-dimensional formula
... Show MoreThe researchers have tried to focus on how to determine the number of pipes that are present in one obtained hyperbola in radargram profile. Ground Penetration Radar (GPR) survey was performed to distinguish between two zero-spaced iron pipes in radargram. The field work was carried out by constructing artificial rectangular models with dimensions of length, width, and depth equal to 10.0, 1.0, 0.65 meter respectively that filled with dry clastic mixture deposit, three twin sets of air filled iron pipes of 15.24 cm (6 inch) diameter were buried horizontally and vertically inside the mixture at different distances together. Visual and Numerical interpretation were chosen to get the best results. In the visual interpretation, the amplitude
... Show More