Biosorption of lead, chromium, and cadmium ions from aqueous solution by dead anaerobic biomass (DAB) was studied in single, binary, and ternary systems with initial concentration of 50 mg/l. The metal-DAB affinity was the same for all systems. The main biosorption mechanisms were complexation and physical adsorption of metallic cations onto natural active functional groups on the cell wall matrix of the DAB. It was found that biosorption of the metallic cations onto DAB cell wall component was a surface process. The main functional groups involved in the metallic cation biosorption were apparently carboxyl, amino, hydroxyle, sulfhydryl, and sulfonate. These groups were part of the DAB cell wall structural polymers. Hydroxyle groups (–OH) were responsible for 37, 52, and 31% of the removal of Pb(II), Cr(III), and Cd(II) by DAB through complexation mechanisms; whereas carboxylic groups (C=O) were responsible for 21, 14, and for 34%of the removal of Pb(II), Cr(III), and Cd(II), respectively. Biosorption data were fitted to four isotherm models. Langmuir model was best fitted to the experimental data than Freundlich, Sips, and Redlich–Peterson models for single system. While for binary and ternary metal systems, extended Langmuir model were fitted experimental data better than interaction factor, a combination of Langmuir–Freundlich and Redlich–Peterson models. The maximum uptake capacities were 54.92, 34.78, and 29.99 mg/g for Pb(II), Cr(III), and Cd(II), respectively. Optimum pH was found to be 4.
This study aimed to study the effect of Ziziphus spina christi Aqueous cold and Alcoholic leaves and fruits extracts on the growth and activities of the following types of bacteria :( Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Streptococcus pyogenes ). The results appeared outweigh the alcoholic extract of leaves and fruits of Sidr that prepared by saxholate extractor by addition of ethanol 95% significant superiority as compared with aqueous extract that prepared by using distilled water as was its influence inhibitor to the growth and effectiveness of bacteria , about the treatment of in-vivo to cause injury to these types of bacteria diagnosed laboratory mice and treated with alcoholic extract of the leaves o
... Show MoreLithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show MoreIn wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with channel coding to deal with several users accessing the multipath fading channels. In FDFE-IDMA, the feedforward (FF) and feedback (FB) filtering operations of FDFE, which use to remove intersymbol interference (ISI), are implemented by Fast Fourier Transforms (FFTs), while in HDFE-IDMA the only FF filter is implemented by FFTs. Further, the parameters involved in the FDFE/
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThis article explores the process of VGI collection by assessing the relative usability and accuracy of a range of different methods (Smartphone GPS, Tablet, and analogue maps) for data collection amongst different demographic and educational groups, and in different geographical contexts. Assessments are made of positional accuracy, completeness, and data collectors’ experiences with reference to the official cadastral data and the administration system in a case-study region of Iraq. Ownership data was validated by crowd agreement. The result shows that successful VGI projects have access to varying data collection methods.
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.