The adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order kinetics.
This study aims to suggest an alternative to the use of quality agricultural soil in the brick industry (Iraq). The Late Miocene claystone bed in the Injana Formation in central Iraq was targeted through the study of 18 exposed sections that were sampled by using the trench sampling method. The claystones are characterized by quartz (36.4%) followed by calcite (32.8%), quartz (36.4%) feldspar (2.6%), gypsum (1.3%) and dolomite (0.7%), kaolinite (10.5%), illite (7.7%), chlorite (6.7%), palygorskite (6.0%) and montmorillonite (0.7%). New thermal mineral phases were formed at 950°C, including diopside (62.9%), quartz (18.4%), wollastonite (8.28%), akermanite (7.6%), Anorthite (6.25%), Nosean (4.9%), gehlenite (3.75%) and Lazurite (3.1
... Show MoreThe mobile phone is widespread all over the world. This technology is one of the most widespread with more than five billion subscriptions making people describe this interaction system as Wireless Intelligence. Mobile phone networks become the focus of attention of researchers, organizations and governments due to its penetration in all life fields. Analyzing mobile phone traces allows describing human mobility with accuracy as never done before. The main objective in this contribution is to represent the people density in specific regions at specific duration of time according to raw data (mobile phone traces). This type of spatio-temporal data named CDR (Call Data Records), which have properties of the time and spatial indications for th
... Show MoreSearch procedures on the treatment research has tended include what cam followers Astaratejaat available to the business organizations to achieve competitive advantage and continued benefits of the form in which the organization can maintain its success in the race competitive and increase production efficiency.
The objectives of the study , the study came with the number of goals and the most important one the knowledge of the relationship and the influence between the variables of the study and review of the latest literature frameworks intellectual and philosophical to the variables of the study and come up with recommendations that could help the organization improve its performance .
... Show MoreAbstract
A new type of solar air heater was designed, fabricated, and tested in Baghdad, Iraq winter conditions. The heater consists of two main parts. The horizontal section was filled with the black colored iron chip while the vertical part has five pipes filled with Iraqi paraffin wax. A fan was fixed at the exit of the air. Two cases were studied: when the air moved by natural convection and when forced convection moved it. The studied air heater has proven its effectiveness as it heated the air passing through it to high temperatures. The results manifest that using little air movement makes the temperatures, stored energies, and efficiencies of the two studied cases converge
... Show MoreStudent performance may influence by several factors in all his study levels such as primary school, intermediate school and even in his college; some of these factors are psychological factors, social factors, and the factors which correlate with student environment.
In this paper we study some of these factors to discover their influence by using canonical correlation analysis to analyze the data. Many conclusions are discovered to help who focuses student performance or to make it pest in future.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o
... Show More