This study depicts the removal of Manganese ions (Mn2+) from simulated wastewater by combined electrocoagulation/ electroflotation technologies. The effects of initial Mn concentration, current density (C.D.), electrolysis time, and different mesh numbers of stainless steel screen electrodes were investigated in a batch cell by adopting Taguchi experimental design to explore the optimum conditions for maximum removal efficiency of Mn. The results of multiple regression and signal to noise ratio (S/N) showed that the optimum conditions were Mn initial concentration of 100 ppm, C.D. of 4 mA/cm2, time of 120 min, and mesh no. of 30 (wire/inch). Also, the relative significance of each factor was attained by the analysis
... Show MoreThis study depicts the removal of Manganese ions (Mn2+) from simulated wastewater by combined electrocoagulation/ electroflotation technologies. The effects of initial Mn concentration, current density (C.D.), electrolysis time, and different mesh numbers of stainless steel screen electrodes were investigated in a batch cell by adopting Taguchi experimental design to explore the optimum conditions for maximum removal efficiency of Mn. The results of multiple regression and signal to noise ratio (S/N) showed that the optimum conditions were Mn initial concentration of 100 ppm, C.D. of 4 mA/cm2, time of 120 min, and mesh no. of 30 (wire/inch). Also, the relative significance of each factor was attained by the analysis of variance (ANO
... Show MoreTodays, World is faced an energy crisis because of a continuous increasing the consumption of fuels due to intension demand for all types of vehicles. This study is one of the efforts dealing with reduce the weight of vehicles by using a new material of sandwich steel, which consists of two skin steel sheets with core of a polymer material. Resistance spot welding (RSW) can be easily implemented on metals; however a cupper shunt tool was designed to perform the resistance welding of sandwich steel with DP800 cover sheets to resolve a non-conductivity problem of a polymer core. Numerical simulations with SORPAS®3D were employed to test the weldability of this new material and supported by many practical experiments. In conclus
... Show MoreThis paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be
... Show MoreSynthesis three organic inhibitors for carbon steel corrosion: 2-(propylthio)-1H-benzo[d]imidazole (PTBI), 2-(allylthio)- 1H-benzo[d]imidazole (ATBI) and 2-(prop-2-ynylthio)-1H-benzo[d]imidazole (YTBI) were prepared from reaction of 2-mercapto benzimidazole with different alkyl halide. The melting point and TLC were used to confirm the purity of the inhibitors as well as using the [FTIR, 1H-NMR and 13C-NMR] for the identify structures. The synthesized inhibitors were examined by potentiostatic polarization measurement as corrosion inhibitors of carbon steel in acidic media [1M H2SO4 ].The polarization measurement results showed that the mixed type inhibitors. In addition, the efficiency of inhibitors (YTBI) were studied at different con
... Show MoreThe aim of this study is to investigate the role of prodigiosin on P. aeruginosa' s biofilm genes involved in the pathogenicity and persistency of the bacteria; Materials and methods: Gram negative bacterial isolates were taken from burn and wounds specimen obtained from some of Baghdad hospitals. Forty six isolates were identified as Pseudomonas aeruginosa and four isolates as Serratia marcescens by using biochemical tests and VITEK 2 compact system. Susceptibility test was performed for all P. aeruginosa isolates, the results showed that 100% were resistant to Amikacin and 98% were sensitive to Meropenem. Resistant isolates were tested for biofilm formation; the strong and moderate isolates (17) were detected by PCR for AlgD gene
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More