Can electrocoagulation technology be integrated with wastewater treatment systems to improve treatment efficiency?
...Show More Authors
The process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (
... Show MoreThe transfer of chemical pollutants from bottled water into water due to heat, sunlight and poor storage is one of the most serious threats to human health around the world, the objective of this study was to estimate the pH value and the transport of heavy metals from plastic bottles to water, for this purpose, 30 bottles of water for 10 local brands were collected and divided into three groups, the first was left at room temperature 25°C, The second was placed in a heat oven at 25°C and the third in another oven at 50°C for two weeks. The results showed significant differences at (P<0.05) between water samples, pH value and concentrations of heavy metals (Sb, Pb, Ni, Cu, Cr, Cd and Fe) we
... Show MoreGod Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreIn this research, a variable stiffness actuator is proposed to enhance the damping of the mechanical vibrating system. The frequency response analysis of the vibrating system is dependant in order to analyze and synthesis this semi-active damping, where the suggested process is using active filter to estimate the present frequency of the vibration system, and this will limit the value of the stiffness of the vibrated system. Two active filter s are needed, low-pass-filter (LPF) to choose the higher stiffness of the actuator at small frequencies as well as more damping and high-pass-filter (HPF) to choose the lower stiffness of the actuator at high frequencies as well as more damping, and so
... Show Moreملخص البحث: تناول البحث الحالي:(أنظمة التكوين الجمالي للكتابات والنصوص في النحت العربي المعاصر)، عددا من الأفكار الأساسية التي تمثل المادة النظرية لتفسير ظاهرة الكتابة في الفن بشكل عام وفي فن النحت بشكل خاص، ولكشف أنظمة التكوين الجمالي وأنواعها المتعددة من خلال فحص بعض النصوص البصرية للفنانين العرب المعاصرين، فقد جاء هذا البحث في أربعة فصول. خصص الفصل الأول: الإطار المنهجي للبحث لبيان مشكلة البحث، وأهم
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreMassive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realist
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More