The present work reports the performance of three types of polyethersulfone (PES) membrane in the removal of highly polluting and toxic lead Pb2+ and cadmium Cd2+ ions from a single salt. This study investigated the effect of operating variables, including pH, types of PES membrane, and feed concentration, on the separation process. The transport parameters and mass transfer coefficient (k) of the membranes were estimated using the combined film theory-solution-diffusion (CFSD), combined film theory-Spiegler-Kedem (CFSK), and combined film theory-finely-porous (CFFP) membrane transport models. Various parameters were used to estimate the enrichment factors, concentration polarization modulus, and Péclet number. The pH values significantly affected the permeation flux of the Pb2+ solution but only had a slight effect on the Cd2+ solution. However, Cd2+ rejection was highly improved by increasing the pH value. The rejection of the PES membranes increased greatly as the heavy metal concentration rose, while the heavy metal concentration moderately affected the permeation flux. The maximum rejection of Pb2+ in a single-salt solution was 99%, 97.5%, and 98% for a feed solution containing 10 mg Pb/L at pH 6, 6.2, and 5.7, for PES1, PES2, and PES3, respectively. The maximum rejection of Cd2+ in single-salt solutions was 78%, 50.2%, and 44% for a feed solution containing 10 mg Cd/L at pH 6.5, 6.2, and 6.5, for PES1, PES2, and PES3, respectively. The analysis of the experimental data using the CFSD, CFSK, and CFFP models showed a good agreement between the theoretical and experimental results. The effective membrane thickness and active skin layer thickness were evaluated using the CFFP model, indicating that the Péclet number is important for determining the mechanism of separation by diffusion.
In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade
... Show MoreThis paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on th
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreThe Bartholin gland cyst is a condition that occurs in approximately 2% of women, most of whom are of reproductive age. Although benign pathology, it is associated with significant patient discomfort. This disorder is caused by the obstruction and consequent dilation of the cyst duct. Definitive treatment involves the surgical removal of the entire cyst. Other alternative treatments include Marsupialization, Word catheter, and the use of CO2 laser. CO2 laser can be used either to vaporize or to excise the Bartholin gland cyst. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of Bartholin gland cyst. Patients, Materials & Methods: This study was done in laser medi
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show Morecapable of the measuring with a high degree of precision in a single instrument. Total stations device are used for station setting up, setting-outmany points from one station. Their major purpose of this work is to take advantage of total station for setting up building and to establish 3D representation using AutoCAD program. The area of the study was Civil Engineering Department at Baghdad University campus AL Jadiriyah. The completion of the work is done in two stages; 1. The field work: In this stage, the Total Station Nikon Nivo-5C was selected for the current study. This device was measured horizontal and vertical distance, elevations, and coordinates from a single set up. This data directly stored on memory. 2. The office work: In t
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show More