The availability of low- cost adsorbent namely Al-Khriet ( a substance found in the legs of Typha Domingensis) as an agricultural waste material, for the removal of lead and cadmium from aqueous solution was investigated. In the batch tests experimental parameters were studied, including adsorbent dosage between (0.2-1) g, initial metal ions concentration between (50-200) ppm (single and binary) and contact time (1/2-6) h. The removal percentage of each ion onto Al-Khriet reached equilibrium in about 4 hours. The highest adsorption capacity was for lead (96%) while for cadmium it was (90%) with 50 ppm ions concentration, 1 g dosage of adsorbent and pH 5.5. Adsorption capacity in the binary mixture were reduce at about 8% for lead and 12 % for cadmium, which was attributed to competitive adsorption. The adsorption parameters were analyzed using both the Freundlich and Langmuir. Al-Khriet was best fitted by the Freundlich isotherm comparing with Langmuir model, and the rate constant was found to be 1.305 and 0.621 ((mg/g)(L/mg)1/n) for lead and cadmium respectively , while the kinetic of adsorption obeyed a second order rate equation and the rate constants were found to be (0.0161) for lead and ( 0.0125) mg.g-1.min-1 for cadmium.
The research aims to develop physical exercises with auxiliary training tools that work to develop the explosive power of the arms and legs, and then find out their effect on the accuracy of shooting from free throw and correction from jumping of advanced basketball players, as the researchers found a problem that these players have weakness in the skill of throwing Free throwing and shooting by jumping calculated with two points as a result of adopting unhealthy physical and technical positions, which led to a lack of focus and accuracy, and thus negatively affected the performance technique of free throw and jump shot, as most teams use traditional exercises without the use of auxiliary training tools, and this topic gave researchers the
... Show MoreThe ground state proton, neutron and matter densities of exotic 11Be and 15C nuclei are studied by means of the TFSM and BCM. In TFSM, the calculations are based on using different model spaces for the core and the valence (halo) neutron. Besides single particle harmonic oscillator wave functions are employed with two different size parameters Bc and Bv. In BCM, the halo nucleus is considered as a composite projectile consisting of core and valence clusters bounded in a state of relative motion. The internal densities of the clusters are described by single particle Gaussian wave functions.
Elastic electron scattering proton f
... Show MoreAbstract
This study turns about The Military Thinking and His Islamic balance in
The Caliph Ali Bin Abi Talib ( peace is on him ) Compact to Malek Al Ashtar
(God be pleased on him )The military field is very wide in all intellectual and
practically effects at The Caliph Ali Bin Abi Taleb(peace is on him ). Its
considered the first seed for islam ,therefore,there are a lot from military
situtions which proved his practical experience in these affairs , and away
from the details of war and practical battles lets search the sample and the
academic study for fair military thinking (justice) in The Compact of Caliph Ali
to Malek Al Ashtar when he became the ruler of egypt.
The military fair thinking determines fr
The alluvial fan of Mandali located between latitude 30˚45’00” N longitude 45˚30’00” E in east of Diyala Governorate, Iraq. Thirty-five wells were identified in the study area with average depth of 84 m and estimated area of 21550 ha. A three-dimensional conceptual model was prepared by using GMS program. From wells cross sections, four geological layers have been identified. The hydraulic conductivity of these layers was calculated for steady state condition, where the water levels for nine wells distributed over the study area were observed at same time. Afterward, PEST facility in the GMS was used to estimate the aquifer hydraulic characteristics. Other characteristics such as storage coefficient and specific yield have
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreNeed organizations today to move towards strategic thinking which means analyzing situations faced by particular challenges of change in the external environment, which makes it imperative for The Organization That to reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures, to try to achieve improvement root in the installation of the organization and methodscompletion of its work towards achieving high levels of performance and that is reflected to achieve its objectives, and this is what aims to Current search to deal with implications characteristics of strategic thinking in the stages of application re-engineering business of the company General Industries
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions
Allah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m