In this study, Yogurt was dried and milled, then shaked with distilled water to remove the soluble materials, then again dried and milled. Batch experiments were carried out to remove hexavalent chromium from aqueous solutions. Different parameters were optimized such as amount of adsorbent, treatment time, pH and concentration of adsorbate. The concentrations of Cr6+ in solutions are determined by UV-Visible spectrophotometer. Maximum percentage removal of Cr6+ was 82% at pH 2. Two equilibrium adsorption isotherms mechanisms are tested Langmuir and Freundlich, the results showed that the isotherm obeyed to Freundlich isotherm. Kinetic models were applied to the adsorption of Cr6+ ions on the adsorbents, pseudo-first-order, the pseudo second-order respectively. Results showed that pseudo second-order kinetic model was applicable to the experimental data well. The thermodynamic parameters such as ΔGº, ΔHº and ΔSº were calculated. ∆H°, ∆S° and ΔGº for this study were negative indicating that the process is exothermic, while negative values of ΔGº indicate spontaneous process.
The aim of the research is to clarify the measurement of the impact regarding financial value of human resources on investors' decisions by considering that the human element is one of the assets of the company. Therefore, a set of criteria must be available to determine the applicability of these standards in the human resource because it has an effective role in the success for the company. Is to measure the value of human resources in a financial format according to the first two methods depends on the value and the second depends on the cost.
In order to achieve the objectives of the study, a questionnaire was designed to survey the views of a number of employees of the General Company for Leather Industries in order to arriv
... Show MoreAbstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa
The Strategy of employees' empowerment, organizational performance and total quality management represent three informative which were and still the hub of many studies and researches including the current study. The higher education is considered one of the most important services sectors and the main development as well as the civil progress in the society. It is the main source that provides the organizations with the human resources having scientific or practical professions. So Higher Education has been chosen especially Baghdad University as a sample of the study. The study problem is concentrated to find answers of the following questions: What the level of the powers mandate in the organization concerning the
... Show MoreThe study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.
The phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreIn this study water quality index (WQI) was calculated to classify the flowing water in the Tigris River in Baghdad city. GIS was used to develop colored water quality maps indicating the classification of the river for drinking water purposes. Water quality parameters including: Turbidity, pH, Alkalinity, Total hardness, Calcium, Magnesium, Iron, Chloride, Sulfate, Nitrite, Nitrate, Ammonia, Orthophosphate and Total dissolved solids were used for WQI determination. These parameters were recorded at the intakes of the WTPs in Baghdad for the period 2004 to 2011. The results from the annual average WQI analysis classified the Tigris River very poor to polluted at the north of Baghdad (Alkarkh WTP) while it was very poor to very polluted in t
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More