In this work Aquatic plant (Nile rose) was used to study adsorption of industrial dye (safranin-O from aqueous solution within several operation conditions. The dried leaves of Nile rose plant were used as adsorbents safranin-O from aqueous solution after different activations such as wet and dry enhancements. The data show increasing in dye solution removal percentage for both activation methods of the adsorbent and also dye removal percentage that was obtained by using adsorbent without any treatment with the progress contact time. The dye removal percentages at equilibrium time 40 minutes were 88.7% at non-activation, 92.3% at thermal activation, and 98.3% at acidic activation. The samples adsorbents before and after adsorption which were scanned by using Fourier Transform Infrared (FTIR) Spectrometry. The scan data showed that the adsorbents contained hydroxyl group in there structure of adsorbents.
A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the
... Show MoreThis article publishes seven cuneiform tablets in the collection of the Iraq Museum Baghdad. Six of the tablets have an Irisagrig/Al Sarraki provenance, the seventh is of uncertain origin. They are dated to the reigns of Amar-Suen (AS) and Ibbi-Suen (IS) of the Ur III Dynasty. The texts represent administrative texts of the governing institutions and account for economic activities including the assignment of female workers for wool plucking, the remuneration of canal work with barley and the selection of wool for textiles. Three tablets record offerings in respect of cultic observances, two of which describe the disbursement of foodstuffs for the king's monthly 83-63 offerings to the new moon.
The ground state proton, neutron, and matter density distributions and corresponding root-mean-square (rms) of P19PC exotic nucleus are studied in terms of two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO) potential are used with two different oscillator parameters bRcoreR and bRhaloR. According to this model, the core nucleons of P18PC nucleus are assumed to move in the model space of spsdpf. The shell model calculations are carried out for core nucleons with w)20(+ truncations using the realistic WBPinteraction. The outer (halo) neutron in P19PC is assumed to move in the pure 2sR1/2R-orbit. The halo structure in P19PC is confirmed with 2sR1/2R-dominant configuration.Elastic electr
... Show MoreIts well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.
Water scarcity is one of the most important problems facing humanity in various fields such as economics, industry, agriculture, and tourism. This may push people to use low-quality water like industrial-wastewater. The application of some chemical compounds to get rid of heavy metals such as cadmium is an environmentally harmful approach. It is well-known that heavy metals as cadmium may induce harmful problems when present in water and invade to soil, plants and food chain of a human being. In this case, man will be forced to use the low quality water in irrigation. Application of natural materials instead of chemicals to remove cadmium from polluted water is an environmental friendly approach. Attention was drawn in this research wor
... Show MoreA mounted specimen of a mustelid animal deposited in the Kurdistan Museum of Natural History, Salahaddin University, Erbil proved to be Mustela erminea (Linnaeus, 1758) and represents a new record for the mammalian fauna of Iraq. Its measurements and some biological noted are provided. Also, two passerine birds; the Red-headed bunting, Emberiza bruniceps Brandt, 1841(Family, Emberizidae) and the Variable wheatear, Oenanthe picata (Blyth, 1847) (Family, Muscicapidae) were recorded for the first time in Iraq. Furthermore, the tree frog Hyla savignyi Audouin, 1829 was found in two locations north east of Iraq with spotted dorsum and having interesting behavior in having the capabil
... Show MoreUndesirable behaviors among students are consider one of the danger problems threating societies and educational and scientific institutions of countries because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :
- Recognize undesirable behavior in students of University by the view of their instructors
- Measure the level of undesirable behavior in students of university by the view of their instructors
- Recognize more common undesirable behavior in students of University by the view o
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More