This study aimed at comparing the performance of vertical, horizontal and hybrid subsurface flow systems in secondary treatment for the effluent wastewater from the primary basins at Al-Rustumia wastewater treatment plant, Baghdad, Iraq. The treatments were monitored for six weeks while the testsduration were from 4 to 12 September 2018 under continuous wastewater feeding for chemical oxygen demand (COD), total suspended solid (TSS),ammonia-nitrogen(NH4-N) and phosphate (PO4-P) in comparison with FAO and USEPA standards for effluent discharge to evaluate the suitability of treated water for irrigation purposes. Among the systems planted with Phragmites Australia, the hybrid subsurface flow system which cons
... Show MoreThis paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreCorrosion of Zn-Ni alloy coatings on stainless steel 316 SS in a chloride-sulfate bath with the addition of either triethanolamine or sucrose was examined. A constant cathode potential was used to deposit zinc-nickel alloys, while cyclic voltammetry and potentio-dynamic polarization were used to measure corrosion. In addition, scanning electron microscopy was utilized to analyse Zn-Ni alloy coating surface layers formed with¬out and with additives. The outcomes discovered that the corrosion resistance of Zn-Ni alloy coat¬ings in 3.5 % NaCl solution was highly influenced by adding triethanolamine or sucrose. Decreasing the Zn:Ni molar ratio led to an increase in corrosion resistance. All Zn-Ni alloy coatings were superior to pure Z
... Show MoreKE Sharquie, AA Noaimi, ZN Al-Khafaji…, Journal of Cosmetics, Dermatological Sciences and Applications, 2016 - Cited by 2
Salmonella is approved as a common foodborne pathogen, causing major health problems throughout the world particularly in low‐ and middle‐income countries. Low-level fluoroquinolone resistance is conferred by both chromosomal and plasmid-encoded resistance, this research was carried out look into the occurrence rate of qnrA,qnrB and qnrS genes in Salmonella enterica serotype Typhi Cipr ofloxacin-resistant insulate from blood samples of patients with typhoid fever. Fifteen Salmonella enterica serotype Typhi isolated previously from patients with typhoid fever were included in this study. All bacterial isolates were confirmed to have ciprofloxacin
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More