Corncob is an agricultural biomass waste that was widely investigated as an adsorbent of contaminants after transforming it into activated carbon. In this research carbonization and chemical activation processes were achieved to synthesize corncob-activated carbon (CAC). Many pretreatment steps including crushing, grinding, and drying to obtain corncob powder were performed before the carbonization step. The carbonization of corncob powder has occurred in the absence of air at a temperature of 500 °C. The chemical activation was accomplished by using HCl as an acidic activation agent. Fourier transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), X-ray diffraction (XRD), and Brunauer–Emmett–Teller (BET) facilitated the characterization of (CAC). The results showed the CAC has non-uniform morphological features with different shapes of its active sites. The prepared CAC was utilized in adsorption of sulfur in its highly complex form of dibenzothiophene (DBT). Particular adsorption parameters of contacting time, temperature, and adsorbent dose were optimized to select the best conditions. These certain conditions are then applied in the adsorption of different DBT concentrations. The maximum removal of DBT reached around 83% at optimal conditions of contacting time (30 min), temperature (60 °C), and adsorbent dose (3 g L-1). The removal efficiency was significantly increased by decreasing the initial concentration of DBT. The experimental data fitted well with the Freundlich isotherm model compared with the Langmuir one. The maximum capacity of CAC for adsorption of DBT at equilibrium was 833.3 mg g-1 at 60 °C. The findings of this research introduce the CAC as a feasible adsorbent for removal DBT from simulated liquid petroleum fuels.
In any natural area or water body, evapotranspiration is one of the main outcomes in the water balance equation. It is also a crucial component of the hydrologic cycle and considers as the main requirement in the planning and designing of any irrigation project. The climatic parameters for the Ishaqi area are calculated from the available date of Samarra and Al-Khlais meteorological stations according to a method for the period (1982–2017) according to Fetter method. The results of the mean of rainfall, relative humidity temperature, evaporation, sunshine, and wind speed of the Ishaqi area are 171.96 mm, 49.67%, 24.86 C°, 1733.61 mm, 8.34 h/day, and 2.3 m/sec, respectively. Values of Potential Evapotranspiration are determined by
... Show MoreObjective: An efficient solution for stabilization is the mobilization of the joints for the arthrokinematics affected by the positional defect of the CAI (i.e. chronic ankle instability). This study put to comparison the impacts of ankle dorsi flexion range of motion (DFROM) as well as dynamic balance ability (DBA) in the patients who have CAI using PJM (i.e. passive joint mobilization), a technique typically been used in previous works, and active joint mobilization (AJM), a technique which could have a greater impact on cortical excitability with the spontaneous movement. Design: rehabilitation program to treat recurrent ankle. Methods: A total of 10 players from the Iraqi clubs Muay Thai team were registered, 5 from each of
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreCox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.
An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThere are many images you need to large Khneh space With the continued evolution of storage technology for computers, there is a continuing need and are required to reduce Alkhoznip space Pictures Zguet pictures in a good way, the way conversion Alamueja to Purifiers
This paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.