The present work utilizes polyacrylic acid beads (PAA) to remove Alizarin yellow R (AYR)] and Alizarin Red S (ARS) from its solution. The isotherms of adsorption were investigated and the factors that impact them, such as temperature, ionic strength effect, shaking effect, and wet PAA. The isotherms of adsorption of (ARS) were found obeys the Freundlich equation. The isotherms of adsorption of (AYR) were found obeys the Langmuir equation. At various temperatures, the adsorption process on (PAA) was investigated. According to our data, there is a positive correlation between the (ARS and AYR) adsorption on the PAA and temperature (Endothermic process). The computation of the thermodynamic functions (ΔH, ΔG, and ΔS) is based on the foregoing findings, and the ionic strength influence on the dyes adsorption was determined at (20 °C). It was discovered that adsorption decreases in the presence of different salt concentrations and tap water. The adsorption kinetics were investigated, and the data were examined by the Lagergren Equation and the second-order equation model. Based on the experimental data, the adsorption was pseudo first-ordered kinetics changed in response to changing conditions
The aim of this study is to utilize the electromembrane extraction (EME) system as a manner for effective removal of zinc from aqueous solutions. A novel and distinctive electrochemical cell design was adopted consisting of two glass chambers, a supported liquid membrane (SLM) housing a polypropylene flat membrane infused with 1-octanol and a carrier. Two electrodes were used, a graphite as anode and a stainless steel as cathode. A comprehensive examination of several influential factors including the choice of carrier, the applied voltage magnitude, the initial pH of the donor solution, and the initial concentration of zinc was performed, all in a concerted effort to ascertain their respective impacts on the efficiency of zinc elim
... Show MoreTranslation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t
... Show MoreAs a marker of systemic inflammation, raised (C-reactive protein (CRP)) concentrations which are still within the normal range have been associated with an increased inflammation of chronic renal diseases (CRD). The current study aimed to establish potential determinats of raised CRP concentrations in patients who treated in Heamodialysis room,then study the relationship between CRP& some biochemical parameters related CRD We used a CRP latex reagents Kit which is based on an immunological reaction between CRP antisera bounded to the biologically inert latex particles or with CRP in the test specimens of 19 patients with (CRD) mean age 48 years ,range = 30?65 & in 21 healthy subjects as control group their age range = 30 ?45 years. The
... Show MoreThe adult worms of the Microphallidae family are mainly found as intestinal parasites of birds and mammals, while metacercariae is most commonly found in decapodal crustaceans. The Microphallidaeare family is spread throughout the world. It includes approximately 47 genera. Mature worms usually enter the digestive system of vertebrates, especially birds and mammals. Microphallidae contain eight subfamilies: Androcotylinae - Basantisiinae - Endocotylinae - Gynaecotylinae - Levinseniellinae - MaritrematinaeMicrophallinae - Sphairiotrematinae. Therefore, due to the lack of studies on the Microphallidae family in Iraq, we began to develop a database on this important family.
Twelve species of Tubuliferous thrips, of the family Phlaeothripidae had been reported from Iraq. Two of these were reported previously, Haplothrips cerealis Priesner, by El-Haidari and Daoud 1971 and Haplothrips tritici kurdjumov by Al-Ali 1977 and the rest were recorded for the first time: these are Haplothrips hukkineni Priesner; Haplothrips subtilissimus (Haliday); Haplothrips reuteri Karny; Haplothrips jasonis Priesner; Haplothrips sallloumensis Priesner; Haplothrips pharao Priesner; Phlaeothrips sycomri Priesner; Karnyothrips flavipus (Jones); Karnyothrips melaleucus (Bagnall); Dolicholepta micrurus (Bagnall). Number of insec
... Show Morehis study aims to determine most stable isobar from some isobaric elements with mass number (A= 50-65 & 180-195). This aim achieved by, firstly: plot mass parabolas for these isobaric family, second: calculated the atomic number for most stable isobar (ZA) value. To plot the mass parabola, the binding energy (B.E) calculated from semi empirical formula for these isobars. The mass number (A) plotted as a function to the (ZA) for each range; we get a linear relationship between them. An empirical formula for the most stable isobar has been developed from this linear dependence. From the results, we can see that mass parabolas for isobaric elements with odd mass number (A) are different from the mass parabolas of even mass number (A) isobars,
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima