Bacteria strain H8, which produces high amount of exopolysaccharide (EPS), was isolated from soil, and identified as strain of Azotobacter chrococcum by its biochemical /physiological characteristics, EPS was extracted, partially purified and used as bioflocculant. The biochemical analysis of the partially purified EPS revealed that it was an alginate. analysis of EPS by Fourier transform infrared spectrometry (FTIR) show that the -OH groups present in bioflocculant are clearly seen at 3433.06 cm-1, the peaks attributed to the -CH3 groups present at 2916.17 cm-1 , and some distinct peaks such as carboxyl group showed strong absorption bands at 1604.66 cm-1, 1411.80 cm-1 and 1303.79 cm-1 indicate the chemical structure of alginate. The effects of various salts, temperature, bioflocculant dosage and pH on the flocculation activity (turbidity removal) were evaluated. When various salts, were used as cation, results showed that CaCl2 and ZnSO4.7H2O enhanced flocculation activity 57.3% and 55.3% respectively compared with CuSO4 and MnCl2 which was 37.5% and 10 % respectively. The bioflocculant had strong thermal stability within the range of 20-100 °C, and the flocculating activity was over 50 %, the maximum flocculation activity was observed at an optimum bioflocculant dosage of 0.25 mL /10 mL (60.8%)., the bioflocculant had highest flocculating activity at alkaline condition pH 10 (77.7 %). After optimization of flocculation conditions, bioflocculant produced was applied to deal with river water and the flocculating activity (turbidity removal) increased to 81%.
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove
... Show MoreThe phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi
The Taylor series is defined by the f and g series. The solution to the satellite's equation of motion is expanding to generate Taylor series through the coefficients f and g. In this study, the orbit equation in a perifocal system is solved using the Taylor series, which is based on time changing. A program in matlab is designed to apply the results for a geocentric satellite in low orbit (height from perigee, hp= 622 km). The input parameters were the initial distance from perigee, the initial time, eccentricity, true anomaly, position, and finally the velocity. The output parameters were the final distance from perigee and the final time values. The results of radial distance as opposed to time were plotted for dissimilar times in
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreA standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.