This study examines the removal of ciprofloxacin in an aqueous solution using green tea silver nanoparticles (Ag-NPs). The synthesized Ag-NPs have been classified by the different techniques of SEM, AFM, BET, FTIR, and Zeta potential. Spherical nanoparticles with average sizes of 32 nm and a surface area of 1.2387m2/g are found to be silver nanoparticles. The results showed that the ciprofloxacin removal efficiency depends on the initial pH (2.5-10), CIP (2-15 mg/L), temperature (20-50°C), time (0-180 min), and Ag-NPs dosage (0.1-1g/L). Batch experiments revealed that the removal rate with ratio (1:1) (w/w) were 52%, and 79.8% of the 10 mg/L of CIP at 60, and 180 minutes, respectively with optimal pH=4. Kinetic models for adsorption and ciprofloxacin mechanism removal were also investigated, and kinetic analyzes showed adsorption to be a 3.8727kJ.mol-1 activation energy physical adsorption mechanism. The kinetic removal process, due to the low activation energy of 14.0606kJ.mol-1, is preferred the model of first-order after a physical diffusion-controlled reaction. Adsorption information from Langmuir, Freundlich, Temkin, and Dubinin models was followed, and the Dubinin isotherm model was the best-fitted model. the thermodynamic parameter ?G0 values at 20, 30, 40 and 50°C were (0.5163, -0.0691, -0.9589, -0.5927kJ/mol). The value of ?H0 and ?S0 were (12.713kJ/mol and 0.0422073kJ/mol.k) which indicated favorable and endothermic sorption. The presence and concentration of CIP in aqueous media were identified through UV analysis.
Fractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThis study was aimed to measure marketing efficiency and study important factors affecting , using TOBIT qualitative response model for wheat crop in Salahalddin province. Results revealed that independent factors such as (marketing type, crops duration in the field, average marketing cost, distance between farm and marketing center, and average productivity) had an impact on wheat marketing efficiency. This impact varied in size and direction due to value of parameters. Values of marketing efficiency fluctuated within cities and towns in the province. The average value on the province level was 76.75%. This study was recommended developing marketing infrastructures which is essential to efficiency increases. In addition, it is impo
... Show MoreAccurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show MoreIn this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreGypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, perm
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show More